80/20 Rule for User Experience & User Adoption

By Ian E. Muller | August 31, 2017
The 80/20 rule is already well known in business for time management, financial planning, and beyond. But when it comes to user experience (UX) development and assessing user adoption of new technology and applications, this principle is also highly effective. The basis of the 80/20 rule is that, on average, 80 percent of your results […]
Read More

Biometric Authentication Methods in Banking & Beyond

By James Stickland | August 29, 2017
Biometric authentication methods provide superior user experience to traditional methods, with increased trust and accountability. With expanding mobile use cases showing particular promise, particularly for replacing tokens, it’s no wonder that more businesses are embracing biometrics. With an improved user experience as a key driver of biometric authentication, companies are able to provide increased usability […]
Read More

Cybersecurity Needs to Evolve, and the Tools Are Already Here

By Ian E. Muller | August 25, 2017
From employees being the biggest security risk to the need for blockchain, cybersecurity has to evolve to meet modern enterprise needs. Read more in today's Weekly Cypher.
Read More

Healthcare Biometrics for Protecting Patient Privacy

By John Callahan | August 24, 2017
Major hospitals and medical centers use integrated electronic medical record (IEMR) systems for scheduling, registration, clinical documentation, ePrescribing, computerized provider order entry, and charge capture. They improve communications, reduce medical errors, control costs, and help physicians deliver quality care by relieving them of inefficient paperwork and processes. IEMR systems also provide connections to external entities, […]
Read More

5 Tricks for Protecting Your Identity Privacy

By Ian E. Muller | August 22, 2017
No one wants their identity stolen, but we also all make a lot of mistakes when it comes to protecting our identity privacy. Learn how to better secure your personal information and avoid common scams and techniques used in identity theft in these five tips. 5 – Check Your Bank Statement Regularly One major mistake […]
Read More

Are Biometrics Integral to Daily Life?

By Ian E. Muller | August 18, 2017
Today's Weekly Cypher looks at the expanding role of biometrics and improvements to cybersecurity this technology provides in our daily lives.
Read More

What Is A Biometric System, and How To Secure It

By Asem Othman | August 17, 2017
This is part of a series of blogs diving into the technical aspects of Veridium’s distributed data model, biometrics, and computer vision research and development by our chief biometric scientist Asem Othman. In our vast, inter-connected world, the need for reliable identity authentication techniques has become of paramount importance. And addressing this need is the […]
Read More

The Future of Mobile Biometrics

By Ian E. Muller | August 15, 2017
Smartphones have evolved at an amazing pace. It’s strange to think that the iPhone launched a mere decade ago. No one can argue that the smartphone hasn’t revolutionized the information age, but it has also challenged businesses and consumers alike to reimagine how they interact with technology and the world at large. One mobile technology […]
Read More

Biometric Authentication Relies on Consistency, Transparency

By Ian E. Muller | August 11, 2017
Today's Weekly Cypher examines how a consistent user experience and transparency on both privacy and security are key components of a successful transition to biometric authentication.
Read More

Creating a Cybersecurity Culture

By James Stickland | August 10, 2017
As data breaches and other forms of cyber warfare continue to hit the headlines, it becomes clearer that the problem isn’t just in having “enough” cybersecurity in place, but that a culture of security doesn’t exist. As a company nestled somewhere within the sphere of cybersecurity, I sometimes forget that building a business with a […]
Read More