Secure for the Holidays

By Ian E. Muller | December 19, 2017
As the holidays roll in and we get festive with friends and family it’s important to not let our personal security slip. From traveling to shopping online, identity theft runs rampant around the holiday season, which is why it’s important to make sure you have security at the top of your wish list. These five […]
Read More

Regulations and Nations

By Rosa Hargrove | December 15, 2017
This issue of the Weekly Cypher explores the emerging regulations and new uses of biometric technologies across the world.
Read More

Biometrics: The Key to Secure Infrastructure

By Rosa Hargrove | December 14, 2017
If you’ve broken up after sharing an HBO Go login, you understand the problems with passwords. Maybe you were the magnanimous one who shared the login info. If so, you may have changed it out of spite (or a respect for good password practices). But maybe you didn’t. Then your ex shared the login info with […]
Read More

Passwords are Broken, but are Biometrics?

By Rosa Hargrove | December 12, 2017
When it comes to online security, we trust far more than we should. We trust our coworkers and friends with our login information. We trust organizations to handle our information responsibly. We trust our passwords to protect us from hackers. Nowadays, some of us even trust biometric authentication to guard most of our information. But […]
Read More

Biometrics on the Move

By Rosa Hargrove | December 8, 2017
The Weekly Cypher is specially curated to keep you up-to-date on the latest in cybersecurity, biometrics, and related news and innovations. Here are a few of the headlines you might have missed this week: New Data Breach Bill Requires Prompt Reporting | PYMNTS.com The reporting ethics for data breaches are inconsistent and hazy, but in […]
Read More

Hackers Continuing to Exploit RDP Credentials

By Rosa Hargrove | December 7, 2017
Hackers are having one hell of a year. They’re finding more vulnerable points to attack digital enterprises. Even as people implement two-factor authentication to get into their personal accounts, hackers are still managing to successfully access email inboxes, servers, and high-privilege access accounts. But there’s one “classic” entry point that hackers are continuing to exploit: […]
Read More

Cybersecurity in 2018: Drastic Measures for Drastic Times

By James Stickland | December 5, 2017
Many of us were affected by the Equifax data breach, but those of us in the cybersecurity industry were shaken to our core. The fallout of this and other major cyberattacks over the last few years has yet to be fully realized, and the sheer scale of these breaches has caused many enterprise leaders in […]
Read More

The Weekly Cypher: Everyday Innovation with Biometrics

By Rosa Hargrove | December 1, 2017
This issue of the Weekly Cypher explores how biometrics are being integrated into everyday life worldwide, from Disneyland to US airports.
Read More

Own Your Name Online: Self-Sovereign Identity

By Rosa Hargrove | November 30, 2017
When you sign up for services, you probably know you’re giving up some of your data. Maybe even 800 pages of it. That’s one app, and that’s not an excessive amount of data to collect. By now, you’ve probably signed up for dozens of apps, profiles, and products. What most people don’t realize is that […]
Read More

GSuite Biometric Integration with VeridiumID for Single Sign-On

By Ross Penny | November 28, 2017
This is the first in a regular series of technically-focused articles from our product team. This article focuses on the configuration steps required to use the VeridiumID platform to add biometric authentication for single sign-on with GSuite. In this instance we do not provision accounts within GSuite, instead relying on Active Directory to provide the […]
Read More