The Death of SHA-1

By Ian E. Muller | February 28, 2017
Security experts have been warning against the use of SHA-1 for years. The aging cryptography algorithm was an initial foray into hash-based security. The second iteration of Secure Hash Algorithm, SHA-1 was developed in 1995, and since there have been new versions, from SHA-2 to SHA-256, developed. However, SHA-1 is still in heavy use today […]
Read More

Mobile Devices Are Driving Biometric Innovation and Use

By Ian E. Muller | February 24, 2017
In this week's "Cypher" we look at developments in mobile biometric technologies and how they are enabling advanced authentication in a number of industries.
Read More

Driving Biometrics With the Power of Mobile

By Ian E. Muller | February 23, 2017
The concept of the modern computer was invented in the 1940s, with the first supercomputer built in the 1960s to perform larger scale computations that weren’t possible with ordinary computers at the time. However, these machines pale in comparison to the small, flat computer we carry around in our pockets every day. The modern smartphone […]
Read More

Biometrics in Film: True or False

By Ian E. Muller | February 21, 2017
Since the 1950s biometrics have been featured in films of all types. Earlier in the history of the silver screen, these were often mysteries, with fingerprints used in criminal investigations. By later on, as the technology itself evolved, movies began portraying biometrics in more capacities, sometimes futuristically, sometimes realistically. The impressive ways that biometrics are […]
Read More

RSA Conference and Beyond

By Ian E. Muller | February 17, 2017
As this year's RSA Conference winds down we look at the news coming out of the event and what's going on elsewhere in cybersecurity.
Read More

Security in the Mobile Age

By Ian E. Muller | February 16, 2017
Mobile devices have allowed us to be “connected” at all times. We’re never more than a swipe away from the latest news, or friends’ Facebook updates, or Tweet. The ability to not just connect online from a mini computer that fits in our pocket, but also control other devices from hundreds of miles away with […]
Read More

Replacing Passwords in Active Directory is a Breeze

By John Spencer | February 14, 2017
Nearly 90 percent of businesses use Active Directory to manage employees and control login credentials to company-owned computers. However, this widely-adopted technology is also fundamentally flawed, thanks to the use of usernames and passwords. That’s why these firms also dedicate a significant portion of their IT resources to managing password-related issues. Whether it’s an actual […]
Read More

Data Breaches Rise as Key Cybersecurity Events Approach

By Ian E. Muller | February 10, 2017
The Weekly Cypher is specially curated to keep you up-to-date on the latest in cybersecurity, biometrics, and related news and innovations. This week’s topics are: InterContinental Hotels Confirms Large Data Breach | Data Breach Today The InterContinental Hotels Group recently reported that point-of-sale devices at dozens of its location’s restaurants and bars throughout North America […]
Read More

Taking Biometrics to the Bank

By James Stickland | February 9, 2017
2016 was – unfortunately – a banner year for data breaches. The one thing all of these attacks had in common? Weak or compromised passwords. This reality should be putting all companies on edge, but some industries – like financial services – are particularly worried, given the extreme financial risk to themselves and their customers, […]
Read More

How Easily Could an IoT Industrial Disaster Happen?

By Jason Braverman | February 7, 2017
IoT is not a new thing. Big industry, especially large refineries and chemical manufacturing plants have been using radio frequency sensors to monitor things like temperature, pressure, light, and vibration on pipes and storage tanks for decades. These sensors send their information to radio receivers which then take that data and feed it to databases. […]
Read More