Easy-to-guess keyboard passwords are just one of the pitfalls of legacy user authentication. In the world of enterprise IT, maintaining security is a challenge and managing the logistics that enable it can be tedious as well. But it is never in vain – protecting the company’s crown jewels is so important, and in our hyper-connected world, strong security procedures are necessary. Biometrics provides that enhanced security, eliminates the... Read more
Wealth attracts criminals like honey attracts bears. It should come as no surprise, then, that the wealth of information and services accessed through fingerprint authentication would be “honey” to the bad guys out there, intent on using such access for illicit purposes. Among their methods is spoofing – the act of fabricating fingerprints for use on... Read more
You’re in another state attending a wedding when you realize you left the gift at home. In an effort to get a quick replacement, you stop at the local department store to get a silver chafing dish. Of course you’ve never been to this department store, you’re not in your home state,... Read more
Thomas Jefferson, in the Declaration of Independence, is famously credited with the assertion that all men are created equal. That time-honored position on equality, however, doesn’t necessarily apply to biometric security, because not all fingerprint authentication is created equal.
In the biometrics... Read more
Technology is moving at an unprecedented pace, especially the technology that allows people to interact with devices such as your smartphone.
To understand why we need to improve human interface, let’s review the market dynamics that are driving the changes in our world. Today, technology advances are not in steps, but in leaps.
Remember the time it took to get from the computer to laptop? And then from mobile phones, to smart... Read more