Biometric Technology News
September 25, 2015
News roundup: More fingerprint records were stolen during the OPM breach than originally reported. Plus: the $1 million iOS bounty; DHS CISO calls for harsher phishing policies; Safe Harbor in hot water.
January 22, 2015
Juniper Research claims that the popularity of biometric authentication will rise dramatically in the next five years, incorporating innovative technology beyond today's fingerprint sensors and voice authentication systems.
October 20, 2014
The newly launched Apple Pay mobile payment system could deliver the most secure shopping experience for U.S. customers yet, though it still may not be perfect.
September 20, 2013
If users readily embrace Apple's new Touch ID fingerprint reader, experts say it could press enterprise biometric adoption forward.
Biometric Technology Get Started
Bring yourself up to speed with our introductory content
Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics. Continue Reading
Bring Your Own Authentication (BYOA) is a computing concept in which employee-owned devices are used as authentication credentials within the enterprise. Continue Reading
Behavioral biometrics are based on human activity such as typing patterns. The term contrasts with physical biometrics, which involves innate physical characteristics such as iris patterns or fingerprints. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Biometric Technology Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Biometric security systems come with many advantages, but do they also come with many regulations? Expert Mike Chapple discusses biometric authentication compliance. Continue Reading
MasterCard is testing a new facial recognition authentication system for mobile payments. Expert Michael Cobb explains how it works, and what it means for users. Continue Reading
Simple photography cracking biometric systems highlights the need for two-factor authentication in enterprises according to expert Randall Gamby. Continue Reading
Manage Biometric Technology
Learn to apply best practices and optimize your operations.
Securing biometric information is a crucial step for enterprises to take, but what happens if the data is still compromised? Expert Randall Gamby discusses biometric data security. Continue Reading
Enterprise authentication practices are plagued with problems. IAM expert Michele Chubirka examines whether the FIDO Alliance can offer solutions. Continue Reading
Identity management technologies are struggling to keep pace with constantly evolving nature of attacks, according to the Center for Applied Identity Management Research (CAIMR). Continue Reading
Problem Solve Biometric Technology Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Millions of fingerprint records were exposed in the OPM breach. Expert Michael Cobb explains how attackers can abuse such biometric data and what enterprises can do about it. Continue Reading
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading
Randall Gamby addresses the criticisms of image-based authentication and considers if it's a viable enterprise alternative authentication method. Continue Reading