Biometrics offer smarter, faster and more respectful border control

This is a guest post by Steve Thies, CEO of Integrated Biometrics It has become clear that 2017 is a year of change and challenge for the United States, especially regarding immigration and national security. With enhanced border protection and aggressive vetting of visitors, immigrants, diplomats and refugees, one of the most important questions will be how to screen these individuals – quickly, accurately and respectfully. Biometric technology can and should be an essential part of these programs. Biometric screening

Peace sign can be used as a weapon against your identity

This is a guest post by Robert Capps, VP of business development at NuData Security It seems that nothing is sacred. Not even the symbol of peace; proving that hackers will wreck just about anything. Last week, a Japanese researcher claimed that he could steal fingerprints from selfies, warning us all that flashing our fingers in photos can imperil your identity. Isao Echizen is a professor at the Digital Content and Media Sciences Research Division of the National Institute of

Secure mobile banking with biometrics

This is a guest post by David van Damme, responsible for partnerships and business development at bunq‎. The mobile industry is constantly evolving, particularly when it comes to what we are able to do with our devices. No trend highlights this better than the innovations occurring in mobile banking and fintech. However, the biggest challenge facing companies in mobile banking is the balance between offering a secure and simultaneously user friendly experience. Dutch-based, mobile-only banking firm bunq is on the forefront

Utilizing face authentication to meet NIPSOM Change 2 requirements

This is a guest post by Don Waugh, Co-CEO of Applied Recognition. Attention ITPSOs (insider threat program senior official): The deadline for new NIPSOM Requirements is November 30, 2016, as set out by the May 18, 2016 Department of Defense published Change 2 to DoD 5220.22-M, “National Industrial Security Operating Manual (NISPOM).” NISPOM Change 2 requires contractors to “establish and maintain an insider threat program to detect, deter and mitigate insider threats. Specifically, the program must gather, integrate, and report

Finding the right rhythm for transactions

This is a guest post by Ryan Wilk, vice president of customer success at NuData Security. US regulators are pushing banks and financial institutions to make cybersecurity a priority and with each new risk event, the pressure on banks and financial institutions grows exponentially. Data breaches and cybercrime continues to skyrocket; we will see over a billion accounts breached this year. The 2016 Identity Fraud Study released by Javelin Strategy & Research, finds that during the past six years’ identity

Biometric trends for 2017

This is a guest post by Alan Goode, Managing Director at Goode Intelligence. Biometrics is one of the hottest topics in technology and cybersecurity markets today. The use of biometrics for user authentication and identity assurance is an essential improvement over usernames and passwords, and innovations in mobile devices, wearables, and other technologies are bringing biometrics to mainstream audiences. ‎ Join me for this webinar, Biometric Trends for 2017, on December 08, 2016, at 11:00am EST, as I discuss with

Top biometric identifiers: Risks & rewards

This is a guest post by Dr. Asem Othman, a biometric scientist at Veridium. While biometric identifiers offer the promise of enhanced authentication compared to prevailing norms, like passwords, their tight, and often unique, linkage to a person makes them highly valuable data to hackers. Hackers who steal, replicate or modify biometric identifiers can cause serious harm to organizations and individuals, since the biometric identifiers of an individual cannot be easily “reset” like passwords. To further explore the potential benefits

The need for dialogue: biometrics are good

This is a guest post by David Menzies, a writer and public relations consultant at Innovative Public Relations. The fact that biometrics – specifically fingerprints and facial recognition – were a large part of quickly identifying and helping to capture the New York City terror bomber, 28-year-old Ahmad Khan Rahami, likely does not surprise anyone involved in this particular market sector. A fingerprint on a pressure cooker, combined with video surveillance footage started the wheels turning and the rest, as

Protecting customer loyalty with comprehensive user verification

This is a guest post by Ryan Wilk, vice president of customer success at NuData Security. According to the 2016 Verizon Data Breach Investigations report, hacking using legitimate user credentials was associated in most of last year’s data breaches, and more than 60 percent of confirmed breaches involved weak, default or stolen passwords. When it comes to data breaches, the biggest impact typically isn’t in the immediate financial sense. Instead, the biggest impact is on customer loyalty. In fact, a

Flexible fingerprint sensors: a game-changer for biometric applications

This is a guest post by Dr. Rouzet Agaiby, Senior Business Development Engineer at FlexEnable. A large percentage of existing fingerprint sensors on the market use silicon technology due to its maturity as well as its established supply chain. Capacitive sensors have been the dominant technology because they allow compact fingerprint sensors in comparison to the main alternative approach of optical fingerprint sensors, which have been more bulky due to the optics used to de-magnify and focus the image. More