IBM Identity Study Shows Security May Be Financial Services Firms’ Best Defense Against Disruption

According to the “IBM Future of Identity Study,” consumers are beginning to prioritize security over convenience, making trust a crucial competitive advantage for financial institutions.

The post IBM Identity Study Shows Security May Be Financial Services Firms’ Best Defense Against Disruption appeared first on Security Intelligence.

Continue reading IBM Identity Study Shows Security May Be Financial Services Firms’ Best Defense Against Disruption

IBM Study Shows Consumers Don’t Trust Social Networks With Identity Data

IBM Security’s “Future of Identity Study” found that consumers don’t trust social media networks to securely collect their identity data, such as biometrics and other PII.

The post IBM Study Shows Consumers Don’t Trust Social Networks With Identity Data appeared first on Security Intelligence.

Continue reading IBM Study Shows Consumers Don’t Trust Social Networks With Identity Data

IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity

IBM Security’s “Future of Identity Study” found that many consumers, especially millennials, are moving beyond passwords and using features such as biometric authentication to secure their identities.

The post IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity appeared first on Security Intelligence.

Continue reading IBM Study: Consumers Weigh in on Biometrics, Authentication and the Future of Identity

Preparing for the iPhone X and the Future of Facial Recognition Technology

The Face ID component is one of the most compelling new features of the iPhone X. Is facial recognition the future of authentication for the enterprise?

The post Preparing for the iPhone X and the Future of Facial Recognition Technology appeared first on Security Intelligence.

Continue reading Preparing for the iPhone X and the Future of Facial Recognition Technology

Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.

The post Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM appeared first on Security Intelligence.

Continue reading Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

Cardiac Scan Authentication — Your Heart As Your Password

Forget fingerprint authentication, retinal scanning or advanced facial recognition that has recently been implemented by Apple in its iPhone X—researchers developed a new authentication system that doesn’t require any of your interaction, as simply being near your device is more than enough.

A group of computer scientists at the University of Buffalo, New York, have developed a new

Continue reading Cardiac Scan Authentication — Your Heart As Your Password

Here’s How CIA Spies On Its Intelligence Liaison Partners Around the World

WikiLeaks has just published another Vault 7 leak, revealing how the CIA spies on their intelligence partners around the world, including FBI, DHS and the NSA, to covertly collect data from their systems.

The CIA offers a biometric collection system—with predefined hardware, operating system, and software—to its intelligence liaison partners around the world that helps them voluntary share

Continue reading Here’s How CIA Spies On Its Intelligence Liaison Partners Around the World