Biometric authentication News
April 27, 2015
Windows 10 security features include hardware-based application whitelisting and facial recognition technology. What could go wrong?
February 20, 2015
News roundup: Amid hidden add-ons, discontinued services and walled gardens, vendor trust proves elusive for several high-profile tech firms. Plus: Evidence ties North Korea to Sony Pictures hack; card brands boost cybersecurity; and cookies that last 8,000 years.
January 30, 2015
According to a new patent application, Apple is looking to expand its Touch ID biometric verification system through the cloud. But will the biometric data be secure?
December 09, 2014
Amid growing fears of stolen credentials and data breaches, the FIDO Alliance released its long-awaited 1.0 specifications for passwordless and multifactor authentication systems.
Biometric authentication Get Started
Bring yourself up to speed with our introductory content
Behavioral biometrics are based on human activity such as typing patterns. The term contrasts with physical biometrics, which involves innate physical characteristics such as iris patterns or fingerprints. Continue Reading
The use of an individual's distinctive typing dynamics can be used as a non-intrusive and reliable form of biometric authentication. Continue Reading
How well do you understand multifactor authentication and the authentication factors that support it? Take our quiz to find out. Continue Reading
Evaluate Biometric authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Tokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief. Continue Reading
Windows 8.1 support for endpoint security includes Open MDM and biometrics, but removing Remote Server Administration Tools can affect Active Directory. Continue Reading
This Security School explores next-generation authentication technologies, standards and methods that may soon replace the personal-password system. Continue Reading
Manage Biometric authentication
Learn to apply best practices and optimize your operations.
Managing information security in a breach-a-day climate is no picnic. In this Essential Guide, we prepare CIOs for the challenge. Continue Reading
Increased worker mobility has brought identity management to the forefront of admins' security concerns. Get tips for updating your plan. Continue Reading
Is an optimized future within our grasp? With prescriptive analytics, it just might be. Businesses have long used data analytics to find out what happened and why. Today, some companies are using prescriptive analytics tools to identify what might happen next. In this issue of CIO Decisions e-zine, SearchCIO Executive Editor Linda Tucci looks at how organizations are using prescriptive analytics not only to identify likely future scenarios but also to recommend steps to optimize those forecasted outcomes.
Also in this issue, Senior News Writer Nicole Laskowski profiles an IT department transformation at Revlon Inc.; Allstate Insurance Co.'s Patricia Coffey shares the leadership skills she's developed as she's moved up the corporate IT ladder; and Laskowski dives into the burgeoning field of biometric authentication, discussing new-wave tools aimed at keeping the enterprise secure. Continue Reading
Problem Solve Biometric authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading
Should CIOs heed biometric security measures and identification? Our #CIOChat-ters weighed in on the implications of biometric-scanning authentication. Continue Reading
When it comes to biometric authentication, the new 'open sesame' is something called the 'eyeprint.' Continue Reading