RSA attendees interested in using biometrics at work

By Fred O'Connor | March 21, 2019
Security professionals are eager to use biometric authentication to access work applications, based on a survey Veridium conducted at RSA. When asked what biometric authentication use case they were most excited to try, 41 percent of respondents said accessing a work account. Other use cases that interested them were using biometrics to identify themselves at […]
Read More

The EU may introduce a national biometric ID card. Will the US follow suit?

By Justine Brown | March 19, 2019
Earlier this month, the EU Council Presidency and European Parliament reached an informal agreement to add biometrics to national identity cards. Under the proposal, new EU ID cards will digitally store two fingerprint images and a facial image on a contactless chip. The proposal is now with the EU ambassadors for confirmation. The European Commission recently […]
Read More

Japan looking at facial recognition to restrict addicts from gambling

By Fred O'Connor | March 14, 2019
The Weekly Cypher is curated to keep you up-to-date on the latest in biometric and cybersecurity news. Here are a few headlines you may have missed this week. Japan looking at facial recognition to restrict addicts from gambling | Biometric Update The government of Japan plans to ask gambling venue operators to consider using facial recognition […]
Read More

How biometrics could improve the E-Verify system

By Justine Brown | March 12, 2019
The senseless death of Iowa college student Mollie Tibbetts last fall made national headlines. In addition to the questions and anger the case raised, it also brought attention to E-Verify, an Internet-based system used to check the immigration status of job applicants. The employers of the undocumented immigrant charged with killing Tibbetts initially said they had run […]
Read More

Overheard at RSA: the challenges around passwords

By Fred O'Connor | March 11, 2019
Amid sessions on IoT security, how to protect organizations from ransomware attacks and attack trends, an arguably less sexy but equally important security topic permeated the 2019 RSA Conference: the challenges around passwords. Here’s a roundup of just a few of the undoubtedly many times that passwords were discussed at RSA. What’s stronger: kale or […]
Read More

With biometrics common in their personal lives, people want to use the technology at work

By Fred O'Connor | March 6, 2019
Using biometrics to unlock a smartphone and access mobile apps has become common. The annoyance of remembering swipe patterns, PINs and passwords has been replaced with a better user experience: touch a fingerprint sensor or just look at your smartphone’s screen and you’re authenticated. In addition to using biometric authentication in their personal lives, people […]
Read More

LG unveils dual-screen 5G smartphone and touts biometric breakthrough

By Derek Goldstein | March 1, 2019
The Weekly Cypher is curated to keep you up-to-date on the latest in biometric and cybersecurity news. Here are a few headlines you may have missed this week. LG unveils dual-screen 5G smartphone and touts biometric breakthrough |Reuters LG has launched its G8ThingQ phone, which can be unlocked without touching the screen through light sensors which […]
Read More

Your questions on strong customer authentication answered

By Fred O'Connor | February 28, 2019
Are European banks prepared to provide strong customer authentication (SCA)? How can biometrics be stored securely? What two-factor authentication methods do banks prefer to use to provide strong customer authentication? These are just a few of the questions we received after our webinar on PSD2 and how payment providers can provide strong customer authentication without impeding […]
Read More

As use of biometrics grows, some states consider legislation to protect privacy

By Justine Brown | February 25, 2019
As the use of biometrics grows across a range of industries, so do concerns over how this information will be used (or misused) and possible effects on personal privacy. To ensure that the parties collecting and managing this data are also protecting and using it properly, some states have implemented laws governing the gathering and […]
Read More