July 24, 2015 Can Tokenization Overcome the Biggest Concerns About Biometric Authentication? 2 min read - HYPR released a biometric authentication SDK that would let third parties overlay fingerprint and voice recognition over other security processes.
Identity & Access July 14, 2015 Identity Security and Privacy for Electronic User Authentication 5 min read - IBM Identity Mixer offers a unique way to keep your user credentials private and protected along with a host of other valuable features.
July 7, 2015 Shopping Online? Your Password Is Passe — Selfies Are the New Security 2 min read - According to MasterCard, your password may soon be passe. The company is turning to selfies as the new security measure for online purchases.
Identity & Access June 8, 2015 It’s a Matter of Trust: Protecting Against Insider Threats 3 min read - Insider threats are a real concern for organizations, but enterprises can improve their security posture with the right management tools and best practices
Intelligence & Analytics June 5, 2015 Tips for Implementing Security Behavioral Analytics 3 min read - Behavioral analytics can comprehensibly develop models that would support an organization's ability to conduct risk assessment of resources.
May 29, 2015 IRS Data Theft Taxes Patience of 100,000 Users 2 min read - News of an IRS data theft reveals that 100,000 tax returns were stolen using "Get Transcript," prompting $50 million in fraudulent refunds.
May 27, 2015 Effectiveness of Security Questions Called Out in New Study 3 min read - The effectiveness of security questions has been called out in a new Google study. Are user answers really as unique as they ought to be?
Banking & Finance May 26, 2015 Are You Ready for the Mobile Banking Authentication Challenge? 4 min read - Fraud attacks may not yet be prevalent on mobile banking channels, but institutions should still strive to get out in front of the challenge.
Application Security April 29, 2015 No Authentication Without Trust 3 min read - Identity authentication should only be conducted after the person trying to access data or information has been deemed trustworthy by the organization.
April 22, 2015 PayPal Suggests Biometric Identification Will One Day ‘Kill All Passwords’ 2 min read - A login mechanism you could eat, digital tattoos and vein recognition could be among the biometric identification tools that protect users, PayPal says.