Hand vein authentication bolsters Sarbanes-Oxley compliance

This is a guest post by Fatima Alali and Paul Sheldon Foote, Professors of Accounting at California State University, Fullerton. Notorious frauds such as Societe Generale and UBS highlight the importance of internal controls. In spite of the Sarbanes-Oxley Act of 2002 (SOX or SOA), external auditors continue to disclose large numbers of material weaknesses in internal control systems of many public companies. In some cases, external public accounting firms have reported these material weaknesses for the same companies for

Biometrics in security: protecting sensitive PII and the sanctity of user identity

This is a guest post by David D. Dunlap, Co-Founder and Senior VP of Corporate Planning, StoneLock Our personal identity is our single greatest asset – after all, how can one function in the world without an identity? However, the use of technology to assign identities warrants the need to balance out the requirements for security with the vital necessity of protecting individual privacy. The use of biometrics has been the subject of serious debate in the Security Industry for

We know you miss your phone, but will it miss you?

This is a guest post by Robert Capps, VP of business development at NuData Security Nomophobia is a distinctly 21st-century phobia, and one that may not be immediately recognizable but the symptoms associated with it will be strangely familiar to millions around the globe. That’s because this new phobia refers to the anxiety people experience when being out of contact with their mobile phone. While this may seem to be a truth self-evident to many, supported by recent studies such

Eliminating passwords in the enterprise

This is a guest post by John Spencer, Chief Product Officer at Veridium Did you know that the average IT team spends more than 7 hours a week resetting employee passwords? At a company with 3,500 end users, that’s more than 45 work days per year. That’s a lot of time spent on a single task, time that could be better spent improving security, fixing other systems, and deploying new technology. Passwords are costing enterprises time and money, with significant

Biometrics and the bottom line

This is a guest post by George Brostoff, CEO and Co-Founder, Sensible Vision “You’ve got to start with the customer experience and work backwards to the technology.” — Steve Jobs Today, business executives are increasingly focused on innovative approaches to cybersecurity and privacy, authentication and managing access to data. And they understand that robust solutions in these areas can facilitate business growth, create market advantages and build brand loyalty. An obvious front-runner in the race to address these issues would

Biometrics offer smarter, faster and more respectful border control

This is a guest post by Steve Thies, CEO of Integrated Biometrics It has become clear that 2017 is a year of change and challenge for the United States, especially regarding immigration and national security. With enhanced border protection and aggressive vetting of visitors, immigrants, diplomats and refugees, one of the most important questions will be how to screen these individuals – quickly, accurately and respectfully. Biometric technology can and should be an essential part of these programs. Biometric screening

Peace sign can be used as a weapon against your identity

This is a guest post by Robert Capps, VP of business development at NuData Security It seems that nothing is sacred. Not even the symbol of peace; proving that hackers will wreck just about anything. Last week, a Japanese researcher claimed that he could steal fingerprints from selfies, warning us all that flashing our fingers in photos can imperil your identity. Isao Echizen is a professor at the Digital Content and Media Sciences Research Division of the National Institute of

Secure mobile banking with biometrics

This is a guest post by David van Damme, responsible for partnerships and business development at bunq‎. The mobile industry is constantly evolving, particularly when it comes to what we are able to do with our devices. No trend highlights this better than the innovations occurring in mobile banking and fintech. However, the biggest challenge facing companies in mobile banking is the balance between offering a secure and simultaneously user friendly experience. Dutch-based, mobile-only banking firm bunq is on the forefront

Utilizing face authentication to meet NIPSOM Change 2 requirements

This is a guest post by Don Waugh, Co-CEO of Applied Recognition. Attention ITPSOs (insider threat program senior official): The deadline for new NIPSOM Requirements is November 30, 2016, as set out by the May 18, 2016 Department of Defense published Change 2 to DoD 5220.22-M, “National Industrial Security Operating Manual (NISPOM).” NISPOM Change 2 requires contractors to “establish and maintain an insider threat program to detect, deter and mitigate insider threats. Specifically, the program must gather, integrate, and report

Finding the right rhythm for transactions

This is a guest post by Ryan Wilk, vice president of customer success at NuData Security. US regulators are pushing banks and financial institutions to make cybersecurity a priority and with each new risk event, the pressure on banks and financial institutions grows exponentially. Data breaches and cybercrime continues to skyrocket; we will see over a billion accounts breached this year. The 2016 Identity Fraud Study released by Javelin Strategy & Research, finds that during the past six years’ identity