Data breach aftermath: recent online fraud trends to watch for

This is a guest post by Ryan Wilk, director of customer success at NuData Security Unlike previous ecommerce industry breaches, recent attacks are growing in size and targeting more valuable PII, which may include information such as Social Security numbers and bank account information, among other data. A data breach has a ripple effect that reaches far beyond the breached organization. Businesses must protect themselves from fraudsters who know more about their customers than they do. They must not only

Voice biometrics: finding the most suitable method for your business

This is a guest post by Graziela Barros, Product Manager for face and voice biometrics solutions at CPqD, in Brazil. The use of voice biometrics to identify people is already a reality in the world: today, approximately 40 million people use this resource for commercial applications. Over the last two years, voice biometrics has outgrown the walls of academic innovation to become a real-world application, considered by companies all over the world as a powerful fraud prevention tool and more

Mobile identity and unlocking the DNA of trust

This is a guest post by Rocky Scopelliti, Global Industry Executive, Telstra Global Industries. For years the concept and use of biometric identification, such as retina fingerprint and voiceprint identification, was only seen in movies. However today, these capabilities are fast becoming realities and what our technology and security savvy consumers are calling out for from their day-to-day service providers. Gen X and Y, the pioneers of the modern digital era, are presenting today’s financial institutions with a new breed

BORDERPOL International Security meeting set for September 11 in Washington DC; Top officials from around the world participating

This is a guest post by Janice Kephart, founder of the Secure Identity & Biometrics Association (SIBA). To bring together the best and the brightest dedicated to helping curtail terrorist travel, and assess its threats, the international nonprofit BORDERPOL is holding it first North America Directorate International Security Meeting “Curtailing Terrorist Travel” September 9-11 in Washington D.C. The conference will move substantively through threats and solutions in visa adjudication, travel document security, international law, air and land ports of inspection,

All forms of biometric authentication are not created equal

This is a guest post by Enacomm CMO David Anderson. Fingerprint scanning, facial recognition and voice biometrics are moving beyond the experimentation phase to broader implementation at financial institutions across the globe — but there’s one form of authentication that stands out from the crowd. The graduation to next-generation identity verification has been made possible by the proliferation of smartphones with high-quality microphones and cameras that make the process easy. Thanks to advancements in technology, biometric authentication can be completed

Assuring lessons learned from the Office of Personnel Management identity and fingerprint cyber theft

This is a guest post by Janice Kephart, founder of the Secure Identity & Biometrics Association (SIBA). The U.S. Office of Personnel Management’s (OPM) tapered transparency on the cyber theft of 22.1 million personal records and 1.1 million fingerprints from a combination of electronic live-scans and digital hardcopy fingerprints for use by the Federal Bureau of Investigation has caused perhaps the worst form of identity theft for dedicated US government employees, and may, in some cases, put safety at risk

Stopping identity theft before it starts: the power of behavioral biometrics

This is a guest post by Ryan Wilk, director of Customer Success, NuData Security. According to the “2014 Data Breach Stats” report, there were 761 data breaches last year, with more than 83 million records exposed. Most people grouse about having to change their username and password or cancel a credit card and then move on with their day. Little thought is given to what happens to that data once it’s been stolen. What happens is that the data is

Microsoft aims to kill the password

According to a recent CNN Money report, Microsoft has an ambitious goal for Windows 10: The software vendor projects that it can install its new Windows 10 operating system into 1 billion devices by 2017. A recent study of IT professionals found that nearly three-quarters of businesses plan on installing Windows 10 within two years of its July 2015 release. The report states 60 percent of IT departments have tested the new Microsoft operating system, and 40 percent plan to

The advantages of integrating biometrics with workforce management solutions

This is a guest post by Mohammad Shahnewaz, Senior Digital Marketing Specialist at M2SYS Technology. With a decade of experience working with companies across all verticals, we have observed that the most successful optimize their systems to achieve maximum efficiency and achieve or surpass expected return on investment (ROI). In order to achieve expected ROI, companies need to ensure that every system and process is functioning accurately and in a timely manner. Workforce management is a clear example where many

Secret police bill passes in Canada

Last week, Canada’s anti-terror bill was passed by Parliament with bipartisan Conservative and Liberal support. Bill C-51 was originally introduced at the end of January to extend Canada’s anti-terror laws. The legislation was reputedly designed by the Conservative government to protect Canadians from jihadist terrorists, but also grants greater powers to police authorities to target activities that could “undermine the security of Canada” as well as activities that the government deems detrimental to Canada’s interests. The main provisions of Canada’s