Email Alerts
-
Security researchers on biometrics, insider threats, encryption and virtualization
In this month's issue of Information Security magazine, Carnegie Mellon's Cylab blazes new trails in biometrics, insider threats, key exchange and virtualization. We review The GuardianEdge Data Protection Platform, Deepdive's DD300 appliance and mor... E-Zine
-
Exploring authentication methods: How to develop secure systems
Use this guide to discover authentication options and learn how to implement, maintain and secure several methods of authentication, such as biometrics, single sign-on (SSO) and smart cards to avoid security breaches and protect sensitive corporate a... Learning Guide
-
Future authentication technologies: How to choose the right product
In this lesson in SearchSecurity.com's Identity and Access Management Security School, Burton Group's Mark Diodati explores innovative and cost-effective user-based authentication technologies. Identity and Access Manag
-
Identity and access management final exam
Find out how much you learned in Identity and Access Management Security School and the areas where you need to focus more attention. Identity and Access Manag
-
Secure user authentication: Regulations, implementation and methods
When deploying any authentication option -- whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls -- businesses need to weigh several factors to decide which option best suits their needs. In this l... Identity and Access Manag
-
Identity and Access Management Services, Systems and Technologies
Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores criti... Security School
-
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. Book Chapter
-
Lesson/Domain 2 -- Security School: Training for CISSP Certification
SearchSecurity.com Security School webcasts are focused on CISSP training. Each lesson corresponds to a specific domain in the CISSP exam's "Common Body of Knowledge." School
-
Infosec Know IT All Trivia: Authentication
Test your knowledge of authentication methods with our Infosec Know IT All Trivia. Quiz
-
Biometrics puts face on IT security
Get an overview of biometric technologies in this special TechTarget interview. Feature
-
Apple's AuthenTec purchase may pave way for iOS biometrics
In addition to fingerprint technology, AuthenTec provides mobile security software licenses. One of its customers is Samsung, a main rival of Apple's. News | 27 Jul 2012
-
Allesandro Acquisti to take down privacy with facial recognition at Black Hat
Privacy researchers Alessandro Acquisti and Ralph Gross have converged facial recognition technology with publicly available personal information on social networks to identify individuals. News | 25 Jul 2011
-
PhoneFactor bolsters authentication using voiceprint identification
The telephone-based out-of-band authentication vendor adds voice recognition technology for banks, government agencies. Article | 21 Jan 2010
-
Group to shed light on secure identity management threats
Identity management technologies are struggling to keep pace with constantly evolving nature of attacks, according to the Center for Applied Identity Management Research (CAIMR). Article | 27 Oct 2009
-
Biometrics project studies ways to combat bank fraud
Industry consortium launches effort to see how biometrics could improve customer authentication and battle identity theft. Analyst says iris scanning at ATMs holds potential. News | 07 Apr 2009
-
Apple iPhone app could boost two-factor
IT costs and user acceptance has hindered deployments of two-factor authentication. But a new Apple iPhone application could increase use once available for other smartphones. Column | 10 Mar 2009
-
Keystroke recognition aids online authentication at credit union
Some banks and financial firms are turning to keystroke recognition as a weapon against online fraud. News | 21 Apr 2008
-
Keynoters push for ID federation, harsher laws
Top executives for two of the industry's biggest companies stressed working together to rebuild trust through open authentication standards and stiffer database breach laws. Article | 17 Jan 2008
-
Verizon security chief says protect your data first
ATLANTA -- JP Callahan, a former counter-intelligence agent with the U.S. Department of Defense, runs data center security for Verizon Business, the company's data center hosting arm. While Callahan has the demeanor of a standup comedian rather th... Interview | 17 Jan 2008
-
Review: DigitalPersona offers solid biometric authentication
Enterprises looking for a biometric single sign-on solution will like what DigitalPersona Pro offers. It's easy to use and can function with single- and two-factor authentication. Article | 09 Mar 2007
- See more News on Biometric Technology
-
How to use the free eEye Retina scanner community edition
In this screencast, learn how to use the free community edition of the eEye Retina scanner. Tip
-
Biometric authentication know-how: Devices, systems and implementation
Discover the pros and cons of multiple biometric authentication devices and techniques, such as iris pattern or fingerprint scans, voice recognition and keystroke dynamics. Also get advice on biometric implementation best practices. Tip
-
Keystroke dynamics makes BioPassword Internet Edition a viable authentication option
BioPassword Internet Edition uses keystroke dynamics to authenticate users, eliminating the need for biometric hardware and token management. Tip
-
Biometrics: Best practices, future trends
Biometrics products are improving, but they still require careful consideration and planning before implementation. In this tip, ID and access management expert Joel Dubin reviews some best practices and pitfalls to watch out for. Tip
-
2006 Products of the Year: Authentication
Information Security and SearchSecurity surveyed readers to identify the best authentication products of 2006. The winners are . . . Tip
-
Cheat sheet: Access management solutions and their pros and cons
A cheat sheet of the most common access solutions with a brief description, and their risks and pros and cons to help you choose the solution that is right for your organization. Tip
-
Layered access control: 6 top defenses that work
Security guru Joel Snyder introduces six strategies for building layered security in networks in this presentation from Information Security Decisions. Tip
-
Checklist for meeting the PCI Data Security Standard
Contributor Diana Kelley summarizes the best ways to meet the PCI Data Security Standard. Tip
-
The here and now of biometrics
Biometrics are increasingly being used to keep the data center safe. And now, the systems are also more affordable, and reliability rates have improved over just a few years ago. Tip
-
Practical biometrics
A look at the different flavors of biometrics and how they are becoming more common as a physical security precaution. Tip
- See more Tips on Biometric Technology
-
Image-based authentication: Viable alternative authentication method?
Randall Gamby addresses the criticisms of image-based authentication and considers if it's a viable enterprise alternative authentication method. Answer
-
Will biometric authentication devices integrate with in-house software?
Biometric devices may provide an added level of security, but how much effort is required to integrate them with existing software and systems, particularly those systems custom made for an organization? Learn more in this expert response from Randal... Ask the Expert
-
Biometric security technology: The safest types of biometric devices
Expert Randall Gamby explains which biometrics devices are most secure, and which could work best in your enterprise. Ask the Expert
-
Electronic access control system and biometrics authentication
Biometrics authentication and an electronic access control system can be closely related, but they're not the same thing. In this IAM expert response, Randall Gamby explains the difference. Ask the Expert
-
Finding the most secure database for biometric security measures
Storing biometric data is different than storing other kinds of data, so what's the most secure database to use? Learn more about biometric data efficiency and database security features in this expert response. Ask the Expert
-
How to protect a laptop: Biometrics vs. encryption
How has biometrics changed the laptop security landscape? Is full disk encryption even necessary on a laptop with a biometric scanner? Learn more in this expert response. Ask the Expert
-
Pre-boot biometric user authentication tools and strategies
Thinking about implementing biometric fingerprint readers for authentication? Learn what to look for in user authentication tools and how to be sure they're compatible with the OS. Ask the Expert
-
To what exactly would a request for biometric data from an insurance provider pertain?
Biometric data serves only to verify identity. Identity and expert management expert Joel Dubin explains what an insurance company might want with biometric data. Ask the Expert
-
What are the possible benefits of microchip implants and RFID tags for employees?
Though it may seem like a good idea to mark employees in high risk areas with implants or RFID tags, there are some serious security concerns to take into account. Ask the Expert
-
Biometrics vs. biostatistics
In this expert response, Joel Dubin examines the differences between biometrics and biostatistics. Ask the Expert
- See more Expert Advice on Biometric Technology
-
multifactor authentication (MFA)
Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction... (Continued) Definition
-
biometrics
Biometrics is the science and technology of measuring and statistically analyzing biological data. In information technology, biometrics usually refers to technologies for measuring and analyzing human body characteristics such as fingerprints, eye ... Definition
-
password hardening
Password hardening is any one of a variety of measures taken to make it more difficult for an intruder to circumvent the authentication process. Password hardening may take the form of multifactor authentication, by adding some component to the u... Definition
-
keystroke dynamics
Keystroke dynamics are the patterns of rhythm and timing created when a person types...(Continued) Definition
-
biometric verification
Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits... (Continued) Definition
-
finger vein ID
Finger vein ID is a biometric authentication system that matches the vascular pattern in an individual's finger to previously obtained data...(continued) Definition
-
live capture
Live capture is the act or method of gathering biometric data from an individual while the individual is physically present. Definition
-
bifurcation
In the biometric process of fingerscanning, a bifurcation is a point in a finger image at which two ridges meet. Definition
-
BioAPI Consortium
The BioAPI Consortium is a group of over 90 organizations whose goal is to encourage and promote the growth of biometric technology by developing an industry-wide application programming interface (API.) The consortium's API defines how a software ap... Definition
-
Automated Fingerprint Identification System (AFIS)
The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. Definition
- See more Definitions on Biometric Technology
-
Gartner on security impact of evolving corporate identity standards
Gartner VP Gregg Kreizman discusses how evolving corporate identity standards and mobility are affecting IT security. Podcast
-
PayPal CISO hopes FIDO Alliance can help replace weak passwords
Video: PayPal CISO Michael Barrett discusses the FIDO Alliance launch and how the open standard for online authentication might help replace weak passwords. Video
-
Researcher details findings on spoofing GPS, malicious insiders
Roger Johnston of Argonne National Laboratory discusses the implications of spoofing GPS and ways to manage angry and potentially malicious insiders. Video
-
Secure authentication trends: Cloud biometrics, next-generation authentication
In this video, Ant Allan discusses secure authentication trends, including next-generation authentication options and cloud biometrics possibilities. Video
-
Gartner on security impact of evolving corporate identity standards
Gartner VP Gregg Kreizman discusses how evolving corporate identity standards and mobility are affecting IT security. Podcast
-
PayPal CISO hopes FIDO Alliance can help replace weak passwords
Video: PayPal CISO Michael Barrett discusses the FIDO Alliance launch and how the open standard for online authentication might help replace weak passwords. Video
-
multifactor authentication (MFA)
Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction... (Continued) Definition
-
Researcher details findings on spoofing GPS, malicious insiders
Roger Johnston of Argonne National Laboratory discusses the implications of spoofing GPS and ways to manage angry and potentially malicious insiders. Video
-
Apple's AuthenTec purchase may pave way for iOS biometrics
In addition to fingerprint technology, AuthenTec provides mobile security software licenses. One of its customers is Samsung, a main rival of Apple's. News
-
Secure authentication trends: Cloud biometrics, next-generation authentication
In this video, Ant Allan discusses secure authentication trends, including next-generation authentication options and cloud biometrics possibilities. Video
-
Image-based authentication: Viable alternative authentication method?
Randall Gamby addresses the criticisms of image-based authentication and considers if it's a viable enterprise alternative authentication method. Answer
-
Allesandro Acquisti to take down privacy with facial recognition at Black Hat
Privacy researchers Alessandro Acquisti and Ralph Gross have converged facial recognition technology with publicly available personal information on social networks to identify individuals. News
-
How to use the free eEye Retina scanner community edition
In this screencast, learn how to use the free community edition of the eEye Retina scanner. Tip
-
Will biometric authentication devices integrate with in-house software?
Biometric devices may provide an added level of security, but how much effort is required to integrate them with existing software and systems, particularly those systems custom made for an organization? Learn more in this expert response from Randal... Ask the Expert
- See more All on Biometric Technology
About Biometric Technology
Get advice from the experts on biometrics technology and security. Learn about several biometric authentication devices and methods -- fingerprint and iris scanners, facial recognition -- that can be used for secure user access and how to implement them.
Security Management Strategies for the CIO