NIST to measure benefits of five identity management pilots

The National Institute of Standards and Technology’s (NIST) Trusted Identities Group (TIG) revealed in a blog post that it will invest $750,000 to assess the benefits of five state and local government identity management pilot projects it funded in 2016. In an effort to find a more effective authentication method, the measurement agency plans to award $750,000 to one vendor that can measure the benefits of NIST-funded pilot projects and find new opportunities for further widespread adoption. Founded in 2015

Crossmatch names former RSA executive as Authentication Market Director

Crossmatch announced that identity industry veteran Jeff Carpenter has joined the company’s marketing team as Market Director, Authentication. Carpenter will be responsible for driving growth of the DigitalPersona Composite Authentication line of business. In this role, he will manage product marketing strategies and development requirements that support new market penetration. “Jeff brings a wealth of experience and security industry knowledge to Crossmatch,” said John Hinmon, vice president of global marketing at Crossmatch. “He will be pivotal in accelerating our continued

FIDO Alliance paper details extending PKI security with authentication standards

The FIDO Alliance has released a new white paper in support of the U.S. Commission on Enhancing National Cybersecurity’s recommendations for all agencies to use strong authentication across all government systems. Titled “Leveraging FIDO Standards to Extend the PKI Security Model in United States Government Agencies,” the paper describes the use of FIDO solutions to improve cybersecurity within the government environment and act as a complement to traditional PKI. Developed by FIDO’s Public Policy and Privacy Working Group (P3WG), the

Smart Card Alliance rebrands, expands charter

The Smart Card Alliance has changed its name to the Secure Technology Alliance and expanded its charter to include a broader range of security and privacy-enhancing technologies. “The Alliance’s focus has always been on engaging in industry-wide discussion and providing best practices and educational resources for designing and building secure payments, identification, access and mobile applications and systems,” said Randy Vanderhoof, executive director of the Secure Technology Alliance. “As the world becomes increasingly interconnected and mobile, the technology used in

Behavioral biometrics enable financial institutions to comply with cybersecurity regulations

The New York State Department of Financial Services’ (NYDFS) new cybersecurity regulations for the financial services industry went into effect last week, which makes authentication solutions like behavioral biometrics easier for financial institutions to comply and protect themselves against cybercriminals, according to a recent blog post by Biocatch. In late February, NYDFS issued a set of cybersecurity regulations that require New York banks, insurance companies and other financial institutions to create and maintain a cybersecurity program designed to protect consumers

NEC provides SMBC with biometrics-based online authorization system

NEC Corporation is providing a new IT system for Sumitomo Mitsui Banking Corporation (SMBC) that enables the bank’s employees in Asia and Oceania to remotely and securely access desktop environments via the Internet. NEC and the Japan Research Institute, Limited at the SMBC Data Center in Singapore, jointly developed the system, which is improving the efficiency of SMBC operations as it is phased into areas of Asia and Oceania. In recent years, SMBC has accelerated the development of business platforms

NYDFS finalizes cybersecurity regulations for New York financial institutions

The New York State Department of Financial Services (NYDFS) recently issued cybersecurity regulations that require New York banks, insurance companies and other financial institutions to create and maintain a cybersecurity program designed to protect consumers and the financial services industry at large, according to a report by Mondaq. The regulations, which take effect on March 1, require all applicable entities subject to come into compliance with most requirements within 180 days of the effective date. However, certain requirements allow up

U.S. government agencies increasingly adopting new biometric authentication tools

U.S. government agencies are increasingly adopting a range of biometric technologies to ­minimize cyberthreats and streamline system access, according to a report by FedTech. The Defense and Homeland Security departments have long been using fingerprint readers to facilitate physical and digital access. However, these agencies and others are increasingly investing in new biometric technologies which measure an individual’s unique physical and behavioral characteristics, including facial dimensions, ­fingerprints and irises, handprints, voiceprints, gait and signature. G. Nagesh Rao, chief technologist at

New York banks look to adopt biometrics in compliance with new cybersecurity rules

New York banks, insurance companies and other financial institutions are preparing to adopt multi-factor authentication including biometrics in compliance with the new cybersecurity rules, which take effect on March 1st, according to a report by Bloomerg BNA. New York Department of Financial Services’ (NYDFS) cybersecurity program is intended to protect consumers and ensure the safety of the state’s financial services industry. One of the requirements of the NYDFS cybersecurity program calls for organizations to use multi-factor authentication “to protect against

Terrorism Studies

Terrorism Studies Certificate / Advanced Certificate / Individual Modules Online delivery with expert tutor support Feb, June and Oct every year Terrorism Studies course is one of the most recommended programs in the industry and is endorsed and recognized by numerous industry experts who have completed the program. Over the years the focus of the course has expanded to include issues such as radicalization, the psychology of terrorism, cybersecurity, intelligence and terrorist use of IEDs, and now we have added