Utilizing face authentication to meet NIPSOM Change 2 requirements

This is a guest post by Don Waugh, Co-CEO of Applied Recognition. Attention ITPSOs (insider threat program senior official): The deadline for new NIPSOM Requirements is November 30, 2016, as set out by the May 18, 2016 Department of Defense published Change 2 to DoD 5220.22-M, “National Industrial Security Operating Manual (NISPOM).” NISPOM Change 2 requires contractors to “establish and maintain an insider threat program to detect, deter and mitigate insider threats. Specifically, the program must gather, integrate, and report

Finding the right rhythm for transactions

This is a guest post by Ryan Wilk, vice president of customer success at NuData Security. US regulators are pushing banks and financial institutions to make cybersecurity a priority and with each new risk event, the pressure on banks and financial institutions grows exponentially. Data breaches and cybercrime continues to skyrocket; we will see over a billion accounts breached this year. The 2016 Identity Fraud Study released by Javelin Strategy & Research, finds that during the past six years’ identity

Biometric trends for 2017

This is a guest post by Alan Goode, Managing Director at Goode Intelligence. Biometrics is one of the hottest topics in technology and cybersecurity markets today. The use of biometrics for user authentication and identity assurance is an essential improvement over usernames and passwords, and innovations in mobile devices, wearables, and other technologies are bringing biometrics to mainstream audiences. ‎ Join me for this webinar, Biometric Trends for 2017, on December 08, 2016, at 11:00am EST, as I discuss with

Top biometric identifiers: Risks & rewards

This is a guest post by Dr. Asem Othman, a biometric scientist at Veridium. While biometric identifiers offer the promise of enhanced authentication compared to prevailing norms, like passwords, their tight, and often unique, linkage to a person makes them highly valuable data to hackers. Hackers who steal, replicate or modify biometric identifiers can cause serious harm to organizations and individuals, since the biometric identifiers of an individual cannot be easily “reset” like passwords. To further explore the potential benefits

The need for dialogue: biometrics are good

This is a guest post by David Menzies, a writer and public relations consultant at Innovative Public Relations. The fact that biometrics – specifically fingerprints and facial recognition – were a large part of quickly identifying and helping to capture the New York City terror bomber, 28-year-old Ahmad Khan Rahami, likely does not surprise anyone involved in this particular market sector. A fingerprint on a pressure cooker, combined with video surveillance footage started the wheels turning and the rest, as

Protecting customer loyalty with comprehensive user verification

This is a guest post by Ryan Wilk, vice president of customer success at NuData Security. According to the 2016 Verizon Data Breach Investigations report, hacking using legitimate user credentials was associated in most of last year’s data breaches, and more than 60 percent of confirmed breaches involved weak, default or stolen passwords. When it comes to data breaches, the biggest impact typically isn’t in the immediate financial sense. Instead, the biggest impact is on customer loyalty. In fact, a

Flexible fingerprint sensors: a game-changer for biometric applications

This is a guest post by Dr. Rouzet Agaiby, Senior Business Development Engineer at FlexEnable. A large percentage of existing fingerprint sensors on the market use silicon technology due to its maturity as well as its established supply chain. Capacitive sensors have been the dominant technology because they allow compact fingerprint sensors in comparison to the main alternative approach of optical fingerprint sensors, which have been more bulky due to the optics used to de-magnify and focus the image. More

Removing the incentive for breaches and fraud: A new approach to cybersecurity

This is a guest post by Robert Capps, vice president of Business Development for NuData Security. Where there is treasure to be had, there will be thieves trying to take it for themselves. This is the dark side of human nature, as sure as death and taxes, and it’s not going to change. Whereas thieves used to use shovels to unearth other people’s treasure, today they use a variety of sophisticated digital tools to take what isn’t theirs. At the

Biometrics are shaping the future of digital banking

This is a guest post by Paco Garcia, CTO at Yoti From blockchain to IoT solutions and digital challengers; the world of banking has been going through a series of changes in the way interactions with customers are carried out. As a result, the financial sector is introducing new and innovative products on an almost daily basis to ensure engagement stays high and loyal customers don’t sway. That’s why we’re seeing more ground breaking technologies enter the world of financial

Biometrics alone will not win the authentication wars

This is a guest post by Terry Nelms, Director of Research at Pindrop Robbing a bank used to mean walking into a building, making threats and walking out with a bag of money. Now, fraudsters rely on committing crimes without a physical presence. From halfway around the world they can phone-in or use the Internet to commit crimes. Obviously, the rules have changed. Hackers target banks and any business with a digital presence to steal people’s identities and export valuable