What’s Going Into NIST’s New Digital Identity Guidelines?

One of this year’s biggest positive cybersecurity events comes from the National Institute of Standards and Technology (NIST). For the first time since 2017, NIST is updating its digital identity guidelines.  These new guidelines will help set the course for best practices in handling digital identity for organizations across all sectors. What is Digital Identity? […]

The post What’s Going Into NIST’s New Digital Identity Guidelines? appeared first on Security Intelligence.

Continue reading What’s Going Into NIST’s New Digital Identity Guidelines?

Biometrics: Choosing the Right Option for Your Security

Do you know who your customers are? Not their demographics, but each customer as they enter your online portal and provide their name, address and credit card number. Or, what about the customer who requests the right to be forgotten and have personal information deleted from your system? Identity verification is required in many, if […]

The post Biometrics: Choosing the Right Option for Your Security appeared first on Security Intelligence.

Continue reading Biometrics: Choosing the Right Option for Your Security

When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics

Knowing who your users are today is more important than ever. This explains, in part, why integrating biometric usage into identity and access management (IAM) appears appealing. Throw in some artificial intelligence (AI) to help manage all these data points, and the future of biometrics looks pretty wild. The appeal of using biometrics for identity […]

The post When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics appeared first on Security Intelligence.

Continue reading When Your Heartbeat Becomes Data: Benefits and Risk of Biometrics

Machine Learning: With Great Power Come New Security Vulnerabilities

Understanding the basic vulnerabilities and prevention tactics associated with machine learning is the first step toward combating these emerging threats.

The post Machine Learning: With Great Power Come New Security Vulnerabilities appeared first on Security Intelligence.

Continue reading Machine Learning: With Great Power Come New Security Vulnerabilities

Will the Future of Authentication Run Into a Privacy Wall?

Digital identify, technological innovation, authentication and data privacy issues are not aligned. This impacts how we handle relationships and business. Policy issues must be resolved.

The post Will the Future of Authentication Run Into a Privacy Wall? appeared first on Security Intelligence.

Continue reading Will the Future of Authentication Run Into a Privacy Wall?

7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week

Reading Time: 5 minutes Black Hat USA and DEF CON revealed some shocking developments in IoT and biometric security, providing important cybersecurity lessons for enterprise security professionals.

The post 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week appeared first on Security Intelligence.

Continue reading 7 Can’t-Miss Cybersecurity Lessons From Black Hat USA and Vegas Security Week

Facing the Promise and Peril of Facial Recognition for Authentication

Reading Time: 6 minutes Great security depends on the ability to know who is authorized and who is not. This applies to both physical and digital security. But how? Increasingly, one answer is facial recognition.

The post Facing the Promise and Peril of Facial Recognition for Authentication appeared first on Security Intelligence.

Continue reading Facing the Promise and Peril of Facial Recognition for Authentication

Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All

Deepfake videos that are indistinguishable from authentic videos are coming, and we can scarcely imagine what they’ll be used for. We should start preparing for the worst.

The post Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All appeared first on Security Intelligence.

Continue reading Don’t Believe Your Eyes: Deepfake Videos Are Coming to Fool Us All

AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.

The post AI May Soon Defeat Biometric Security, Even Facial Recognition Software appeared first on Security Intelligence.

Continue reading AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand

When framed as an innovative, even “cool” feature, multifactor authentication can deliver the security online retail customers demand without diminishing the user experience.

The post Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand appeared first on Security Intelligence.

Continue reading Multifactor Authentication Delivers the Convenience and Security Online Shoppers Demand