Manage
Learn to apply best practices and optimize your operations.
Biometric Technology
Say hello to the future of authentication, bye to passwords
Passwords and tokens are a thing of the past. No way, you say? Our webcast on the likely ways authentication will work in the future may make a believer out of you. Continue Reading
Samsung S8 iris scanner: How was it bypassed?
Hackers bypassed the Samsung S8 iris scanner, which could spell trouble for biometric authentication. Expert Nick Lewis explains how it happened and how to stay protected. Continue Reading
How should enterprises react to compromised biometric information?
Securing biometric information is a crucial step for enterprises to take, but what happens if the data is still compromised? Expert Randall Gamby discusses biometric data security. Continue Reading
-
In dog days of enterprise authentication, can FIDO Alliance help?
Enterprise authentication practices are plagued with problems. IAM expert Michele Chubirka examines whether the FIDO Alliance can offer solutions. Continue Reading
Group to shed light on secure identity management threats
Identity management technologies are struggling to keep pace with constantly evolving nature of attacks, according to the Center for Applied Identity Management Research (CAIMR). Continue Reading
Apple iPhone app could boost two-factor
IT costs and user acceptance has hindered deployments of two-factor authentication. But a new Apple iPhone application could increase use once available for other smartphones.Continue Reading
Vein-reader biometric authentication for health care, financials
Health care facilities, along with financial institutions, are prime market targets for vein-reading technology, the latest in biometric applications.Continue Reading
DigitalPersona Workstation Pro and Server for Biometric Authentication
This review evaluates DigitalPersona Pro, a single sign-on (SSO) software suite that allows an enterprise to replace passwords with biometric fingerprint readers or provide dual-factor authentication.Continue Reading
Identity and access management final exam
Find out how much you learned in Identity and Access Management Security School and the areas where you need to focus more attention.Continue Reading
Identity and Access Management Services, Systems and Technologies
Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores ...Continue Reading
-
Biometrics
BioPassword's BioPassword Internet EditionContinue Reading
Biometrics: Best practices, future trends
Biometrics products are improving, but they still require careful consideration and planning before implementation. In this tip, ID and access management expert Joel Dubin reviews some best practices and pitfalls to watch out for.Continue Reading
Cheat sheet: Access management solutions and their pros and cons
A cheat sheet of the most common access solutions with a brief description, and their risks and pros and cons to help you choose the solution that is right for your organization.Continue Reading
Checklist for meeting the PCI Data Security Standard
Contributor Diana Kelley summarizes the best ways to meet the PCI Data Security Standard.Continue Reading
Cancer center finds solution to its biometric management woes
Cancer center finds solution to its biometric management woesContinue Reading