From spoofing to iris scanning — the future of biometrics

As we enter the first part of the new year, we’re setting our resolutions (or perhaps already breaking them), and reflecting on 2016. We witnessed many highs and lows last year, and it seems it’s trendy right now to bemoan everything that happened. This is no different in the security world. We saw some of the biggest — and highest-profile — breaches of all time (DMC and Yahoo, just to name a few) and nearly all of them involved compromised, weak, or reused passwords.

Related Resources

Using Veridium for Passwordless
Authentication


Watch Now