Cybersecurity is Dead, Long Live Cybersecurity

By Elizabeth Medeiros | June 9, 2017
The seemingly unstoppable rise of ransomware is leading many to think cybersecurity is dead, but could biometrics be the next king? Learn more in today's Weekly Cypher.
Read More

Why 4 Fingers is also the Most Private Biometric

By Asem Othman | June 8, 2017
We often talk about why 4 Fingers TouchlessID is the most secure mobile biometric available. However, it is also important to highlight why it’s the easiest biometric to keep totally private as well. Biometric data privacy is a critical topic of conversation, especially in light of new regulations like GDPR coming soon. With 4 Fingers […]
Read More

Understanding GDPR: Myths & Reality of Compliance

By Ian E. Muller | June 6, 2017
Do the letters GDPR bring a sense of dread? Is worrying over compliance keeping you up at night? Or are you unsure of what they even mean? If your company does business in the EU, it’s an acronym you’ll want to familiarize yourself with in the next few months. GDPR, or the General Data Protection […]
Read More

Biometric Tech Expands While Consumer Trust Grows

By Ian E. Muller | June 2, 2017
In The Weekly Cypher today we explore how biometric tech continues to advance as consumer trust grows, driving more innovation through the field of biometric authentication.
Read More

So Biometrics Alone Isn’t the Answer to the Login Process, but Neither is Passwords

By James Stickland | June 1, 2017
We all know that no two biometrics are created equal, and many have touted that fingerprint and iris are much more secure than face or voice. That’s why it came as little surprise when BBC reported that it was able to bypass HSBC’s new Voice ID technology. More people were shocked when, just a few […]
Read More

Securing Biometric Enrollment is Paramount for Safe Authentication

By Jason Braverman | May 30, 2017
Now that biometrics is starting to take hold in more venues, companies need to be especially aware of the process of initial enrollment. A biometric system is only as good as its measurement of the person in question. Additionally, how this information is stored and used is critical to the overall architecture of any biometric […]
Read More

Hacking Biometrics & Securing Authentication

By Ian E. Muller | May 26, 2017
This Weekly Cypher looks at all the recent presentation attacks on biometric authentication systems, and where the real flaws lie.
Read More

Blockchain & Biometrics: The Future of Identity

By John Callahan | May 25, 2017
In the future biometrics will be used extensively for identity management. Biometric authentication is already closely tied to the concept of identity since some biometrics can uniquely identify you within a given set of users (e.g., employees or citizens). In this context, identity is the means by which you make “claims” to rights, membership, and ownership […]
Read More

Remote Identity Verification: Expanding the Potential of Mobile Biometrics

By Ian E. Muller | May 23, 2017
One of the main problems plaguing the financial and government sectors with regard to remote enrollment is identity verification. When a remote customer wants to open a new bank account, register to vote, or set up a government benefits account, their identity needs to be verified with the utmost scrutiny. Luckily, innovations in biometrics technology […]
Read More

Ransomware makes us all WannaCry

By Ian E. Muller | May 19, 2017
Today's Weekly Cypher focuses on the massive WannaCry ransomware attack, and why it should be a wake-up call to organizations and consumers around the globe.
Read More