5 Tips for Improving Your Personal Cybersecurity

By Ian E. Muller | September 22, 2017
As more companies seek to advance their cybersecurity measures and protect their data and customers, there’s a lot we as end users can do as well. Personal cybersecurity plays a critical role in an overall organization’s protections as well, be it your employer or a social network. For employers, you already know that helping workers […]
Read More

The Future is Bright for Mobile Biometrics

By Ian E. Muller | September 21, 2017
From fingerprint to iris, mobile biometrics are evolving at such a rapid pace it’s often difficult for consumers to keep up. Nearly every mid- to high-end device on the market offers a fingerprint scanner today, and Samsung and Apple have begun paving the way for more advanced methods of biometric capture as well with iris […]
Read More

Why Do Biometrics Improve Security?

By Ian E. Muller | September 19, 2017
We often discuss the merits of biometric authentication as a way to advance cybersecurity on personal and enterprise levels. But it’s important for you to understand why biometrics offer improvements to security, and what the advantages actually are. No Passwords to Steal Passwords account for 81 percent of data breaches, making them the biggest flaw […]
Read More

Security in Focus for the Nation

By Ian E. Muller | September 15, 2017
While inundated with Equifax and Apple news, here are the headlines you might have missed in today's Weekly Cypher.
Read More

From Anthropometry to Fingerprint Systems

By Asem Othman | September 14, 2017
This is part of a series of blogs diving into the technical aspects of Veridium’s distributed data model, biometrics, and computer vision research and development by our chief biometric scientist Asem Othman. In the nineteenth century, Alphonse Bertillon, a French policeman, was the first to introduce the science of identifying a person based on his/her […]
Read More

Will Face ID Really Replace Touch ID?

By Asem Othman | September 12, 2017
The upcoming iPhone 8, or iPhone X, is bringing some major changes to Apple’s flagship device, the biggest of which is the removal of the home button. This move allows for increased real estate on the device for the screen, but it may eliminate one of the iPhone’s most popular features – Touch ID. For […]
Read More

Identity Lies at the Center of Security

By Ian E. Muller | September 8, 2017
Identity plays a crucial role in enterprise security, from improving IAM strategies to investing in biometrics for cybersecurity and access control. Today's Weekly Cypher explores some of the latest news on identity.
Read More

Who Owns Your Biometric Data?

By Ian E. Muller | September 7, 2017
Do you use your fingerprint to log into your banking app? What about for authenticating a payment? Does your work use face or iris recognition for accessing secure facilities? Do you unlock your phone with a biometric? If so, you might be wondering where that data is stored. And for those of you worried about […]
Read More

The Evolution of Cybersecurity Lies in Biometrics

By Ian E. Muller | September 1, 2017
Today's Weekly Cypher looks at how cybersecurity is evolving and the role biometrics plays in enhancing security and usability for improved authentication.
Read More

80/20 Rule for User Experience & User Adoption

By Ian E. Muller | August 31, 2017
The 80/20 rule is already well known in business for time management, financial planning, and beyond. But when it comes to user experience (UX) development and assessing user adoption of new technology and applications, this principle is also highly effective. The basis of the 80/20 rule is that, on average, 80 percent of your results […]
Read More