Smashing Security podcast #311: TikTok, wiretapping, and your deepfake voice is your password

Who has been warning Italian criminals that their phones are wiretapped? Can you trust your voice to protect your bank account? And why is TikTok being singled out by investigators?

All this and much much more is discussed in the latest edition of t… Continue reading Smashing Security podcast #311: TikTok, wiretapping, and your deepfake voice is your password

Illinois’ biometric privacy law provides blueprint as states seek to curb data collection

An estimated 17 pieces of privacy legislation backed by both Democrats and Republicans are pending across the country.

The post Illinois’ biometric privacy law provides blueprint as states seek to curb data collection appeared first on CyberScoop.

Continue reading Illinois’ biometric privacy law provides blueprint as states seek to curb data collection

What’s Going Into NIST’s New Digital Identity Guidelines?

One of this year’s biggest positive cybersecurity events comes from the National Institute of Standards and Technology (NIST). For the first time since 2017, NIST is updating its digital identity guidelines.  These new guidelines will help set the course for best practices in handling digital identity for organizations across all sectors. What is Digital Identity? […]

The post What’s Going Into NIST’s New Digital Identity Guidelines? appeared first on Security Intelligence.

Continue reading What’s Going Into NIST’s New Digital Identity Guidelines?

Novel face swaps emerge as a major threat to biometric security

Digital identities are rapidly becoming more widely used as organizations’ and governments’ digital transformation projects mature and users demand more remote accessibility for everything, from creating a bank account to applying for government servic… Continue reading Novel face swaps emerge as a major threat to biometric security

3 important changes in how data will be used and treated

Regula has presented their vision of the developments that will shape the industry’s landscape in 2023. Deepfakes, new cyber-hygiene norms, and demand for mature ID verification platforms are among some of the predictions for the next year. While more … Continue reading 3 important changes in how data will be used and treated

2FA, 3FA, MFA… What does it all mean?

Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user must prove their identity by providing specific access credentials. The system asks: “Who are you? Pro… Continue reading 2FA, 3FA, MFA… What does it all mean?