Biometrics Improving Security Across Sectors

By Ian E. Muller | February 9, 2018
The Weekly Cypher is specially curated to keep you up-to-date on the latest in cybersecurity, biometrics, and related news and innovations. Here are a few of the headlines you might have missed this week: IoT Security is a Must Today | FCW The Internet of Things (IoT) ecosystem is exploding, and there’s no stopping it. […]
Read More

Text, Token, or Finger? Why 2FA Needs Biometrics

By Ian E. Muller | February 8, 2018
Two-factor authentication (2FA) is vastly superior to using a password alone, adding a second layer of security over something that we all admittedly don’t protect as well as we should. Do you regularly change your password? Is it longer than 12 characters? Did you just use “!” for the required special character? If you’re guilty […]
Read More

Biometric Mythbusters: Do Stolen Fingerprints Mean Identity Theft?

By Ian E. Muller | February 6, 2018
This article focuses on the theft of a complete fingerprint image. Stay tuned for a follow-up article on why you also don’t need to worry to much if your biometric template is stolen from an authentication system. With the rise of biometrics in use across our business and personal lives, it can be easy to […]
Read More

Protecting Employee Access is Key for Advancing Security

By Ian E. Muller | February 2, 2018
This issue of the Weekly Cypher explores the evolving role of access management in security, particularly for government agencies and banks. Improving protection for identity access management will be critical in 2018.
Read More

Biometrics are the Future of Identity

By Sarah Landes | February 1, 2018
The Turning Tide of Data Security In the beginning, there was the Internet. And then the Internet gods populated it with basic services and applications. In that blissfully simple time, consumers had little to worry about. There were only a few passwords to remember, and only a little personal data was stored online. Now, however, […]
Read More

Adding Biometric Authentication to Citrix NetScaler for 2FA

By Ross Penny | January 30, 2018
Adding Veridium’s biometric authentication to Citrix NetScaler Unified Gateway and replacing any kind of two-factor token-based authentication is easy. Veridium uses push notification technology to request biometric authentication from the user’s mobile device, therefore there’s nothing for the user to enter in the second password dialog box, i.e. a token code, which normally appears when […]
Read More

Security Woes Can’t Change Overnight, but Technology Is

By Ian E. Muller | January 26, 2018
This issue of the Weekly Cypher explores the evolution of security technologies like single sign-on, biometric authentication, KBA, and blockchain, and how firms can keep up with this rapidly changing field.
Read More

No More Half Measures: Combating Money Laundering in the Digital Age

By Sarah Landes | January 25, 2018
What is Money Laundering? If you have watched television in the past ten years, then you have probably seen or heard of Breaking Bad. The show’s main character – the meth-making mastermind Heisenberg – realizes early on in his risky career that he somehow needs to legitimize the money he makes – for his family’s […]
Read More

2017 Was the Worst Year for Data Breaches Yet

By Ian E. Muller | January 23, 2018
2017 was a banner year in cybersecurity for both the right and wrong reasons. We saw an influx of companies embracing stepped-up authentication strategies, including biometric authentication, to enhance security and improve end-user privacy. But we also saw a rise in cyber attacks and severe data breaches. Worst of all, many of the biggest breaches […]
Read More

Mobile, Games, Cloud & Biometrics for Improving Cybersecurity

By Ian E. Muller | January 19, 2018
This issue of the Weekly Cypher explores the evolving role that mobile, cloud, and biometrics technologies are having in improving cybersecurity, as well as the surprising role that gamification may play.
Read More