Digital Identity is the Key to Online Privacy

By Ian E. Muller | April 25, 2017
Today, our identities are our most closely kept secret. We intend to remain anonymous online, we avoid “identity theft,” and we try to protect our identities whenever possible. The threat here is that, if our identities are compromised, we lose our ability to control our lives, both financially and digitally. This is why we safeguard identifiers, […]
Read More

Securing, and Losing, Biometrics

By Ian E. Muller | April 21, 2017
The Weekly Cypher is specially curated to keep you up-to-date on the latest in cybersecurity, biometrics, and related news and innovations. This week’s topics are biometrics, better ways to secure them, and the risks associated with losing them.
Read More

IDaaS is the Next Big Thing

By Jason Braverman | April 20, 2017
Identity-as-a-Service (IDaaS), might just be the next big thing in identity protection. One of the biggest challenges people have is integrating and accessing useful two-factor (2FA) and multi-factor authentication (MFA) schemes. There are a wide variety of companies and products designed to help you protect your online identity, but integrating them into your existing platform […]
Read More

Visual Cryptography Keeps Biometrics Secure

By Ian E. Muller | April 18, 2017
We talk at length about the importance of keeping biometric data secure, but it’s also important to highlight the technology that’s used to do so. One method we recommend for securing biometrics and keeping them private is visual cryptography. This form of encryption uses a unique approach to eliminate some of the riskier elements of […]
Read More

Identity is a Driving Force in New Tech

By Ian E. Muller | April 14, 2017
This week's Cypher focuses on why identity is becoming the cornerstone of enterprise security and access management. Learn why more firms are investing in identity and access management solutions and biometrics.
Read More

Bringing Second-Factor Authentication to the Enterprise Cloud

By James Stickland | April 13, 2017
We’re not strangers to cloud services, but to date, the majority of investments in third-party cloud solutions have been by SMBs and consumers. Lately, more large-scale enterprises have been deploying cloud solutions in different parts of their operations. From Dropbox to Salesforce, more companies are embracing third-party cloud services, but as a result may be […]
Read More

True Security Protects Both User Identity & Privacy

By Ian E. Muller | April 11, 2017
Discussions around biometrics always turn to two topics – identity or privacy. What’s missing from the conversation is how both are essential parts of modern security, and how the right strategy will leverage and protect both at the same time. Identity in the Digital Age Fifty years ago identity meant your driver’s license, passport, Social […]
Read More

Identity and Authentication are the Future

By Ian E. Muller | April 7, 2017
This week's Cypher turns to the future of mobile biometric authentication, identity, and the cybersecurity trends of the future.
Read More

Protecting Your Most Private Data – Your Biometrics

By Asem Othman | April 6, 2017
Data privacy is a major concern for everyone. For businesses, it isn’t just about protecting themselves from attack, but also the financial and legal concerns that go along with data breaches. As companies collect more data on their employees and customers, the risks increase exponentially, and it’s essential that firms use the best systems possible […]
Read More

Is Data Privacy Impossible in an IoT World?

By Ian E. Muller | April 4, 2017
We focus on the dangers of the Internet of Things (IoT) a great deal. How the proliferation of these devices, and their lack of access security, allow hackers to hijack them for botnets is only one piece of this danger, however. As we invest more in home automation and other interconnected technologies, we’re also putting […]
Read More