Biometrics in 2019: Increased Security or New Attack Vector?

Should we pump the brakes on the roll out of biometric security to first consider whether we are creating new vulnerabilities? Continue reading Biometrics in 2019: Increased Security or New Attack Vector?

We Need to Talk About NIST’s Dropped Password Management Recommendations

NIST has changed its long-standing recommendations for password management, favoring minimal user friction over complexity requirements and regular password updates.

The post We Need to Talk About NIST’s Dropped Password Management Recommendations appeared first on Security Intelligence.

Continue reading We Need to Talk About NIST’s Dropped Password Management Recommendations

How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Governments must embrace an immune system approach centered on security intelligence to stay ahead of advanced cyberthreats looking to breach the ever-widening perimeter of smart cities.

The post How Can We Make Smart Cities Even Smarter? Start With Security Intelligence appeared first on Security Intelligence.

Continue reading How Can We Make Smart Cities Even Smarter? Start With Security Intelligence

Android Gets New Anti-Spoofing Feature to Make Biometric Authentication Secure

Google just announced its plan to introduce a new anti-spoofing feature for its Android operating system that makes its biometric authentication mechanisms more secure than ever.

Biometric authentications, like the fingerprint, IRIS, or face recogniti… Continue reading Android Gets New Anti-Spoofing Feature to Make Biometric Authentication Secure

Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

The introduction of smart assistants into the workplace is inevitable, and while they do carry unique risks, they are no more severe than the risks associated with widely deployed IoT devices.

The post Are Enterprises Ready to Introduce Smart Assistants in the Workplace? appeared first on Security Intelligence.

Continue reading Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

The introduction of smart assistants into the workplace is inevitable, and while they do carry unique risks, they are no more severe than the risks associated with widely deployed IoT devices.

The post Are Enterprises Ready to Introduce Smart Assistants in the Workplace? appeared first on Security Intelligence.

Continue reading Are Enterprises Ready to Introduce Smart Assistants in the Workplace?

Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious

IBM’s new “Future of Identity Study” revealed that while millennials are less likely to use complex passwords than their older counterparts, they embrace new technologies for identity protection.

The post Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious appeared first on Security Intelligence.

Continue reading Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious

Beyond the Password Era: Changing Consumer Habits Signal the End Is Near

A recent IBM Security study found that consumers, especially millennials, are beginning to embrace alternatives to password protection, such as biometric authentication.

The post Beyond the Password Era: Changing Consumer Habits Signal the End Is Near appeared first on Security Intelligence.

Continue reading Beyond the Password Era: Changing Consumer Habits Signal the End Is Near

Beyond the Password Era: Changing Consumer Habits Signal the End Is Near

A recent IBM Security study found that consumers, especially millennials, are beginning to embrace alternatives to password protection, such as biometric authentication.

The post Beyond the Password Era: Changing Consumer Habits Signal the End Is Near appeared first on Security Intelligence.

Continue reading Beyond the Password Era: Changing Consumer Habits Signal the End Is Near

Discover Silent Identity and Access Management

Silent identity and access management (IAM) solutions are designed to work seamlessly in the background so that users don’t even know it’s there, intervening only when problems arise.

The post Discover Silent Identity and Access Management appeared first on Security Intelligence.

Continue reading Discover Silent Identity and Access Management