From spoofing to iris scanning — the future of biometrics

As we enter the first part of the new year, we’re setting our resolutions (or perhaps already breaking them), and reflecting on 2016. We witnessed many highs and lows last year, and it seems it’s trendy right now to bemoan everything that happened. This is no different in the security world. We saw some of the biggest — and highest-profile — breaches of all time (DMC and Yahoo, just to name a few) and nearly all of them involved compromised, weak, or reused passwords.

Related Resources

Workforce Authentication

Using Veridium for Passwordless
Authentication


Watch Now

Swiss Bank Case Study

Case Study
Global
Swiss Bank


Watch Now

Citrix Integration with Veridium Passwordless

VeridiumID Platform's Integration Capabilities with Citrix


Watch Now