More than half of cyber intrusions to U.S. federal agencies could have been prevented using strong authentication, according to a report from the White House Office of Management and Budget. The annual report to Congress on the Federal Information Security Act (FISMA) details how agencies are still behind when it comes to using PIV credentials and strong authentication technologies.
04 Mar, 2015U.S. Federal agencies lagging with PIV, strong authentication
03 Mar, 2015FinSphere linking the mobile to consumers
Visa deal brings location confirmation to the payments market
Using geo-location from a mobile device to make sure that an individual is in the same location of a payment or authentication request is one of the core tenants of an adaptive authentication system and FinSphere is now bringing this to payments world.
02 Mar, 2015A cloud over redmond: Microsoft focuses on BYOD
Microsoft Corp. wants to shift the focus of computing to the mobile and cloud. The company wants to seize the opportunity to hook up with all those Internet-connected devices. Key to this vision, Microsoft is turning to the cloud to provide consumers with more identity authentication options and help organizations embrace a bring-your–own-device (BYOD) policy.
26 Feb, 2015New credentialing software, Indian police using facial recognition, Zetes providing African health card IDs
Entrust Datacard unveiled the new Datacard TruCredential Suite Software; NEC India Pvt. Ltd., NEC Corp. and Innovative Telecom & Softwares Pvt. Ltd., announced the deployment of NEC’s face recognition technology for Surat City Police; Côte d’Ivoire has selected Zetes for registration and the production of cards for 4 million health card cards; FIME and Thales have announced the launch of a joint offering for the host-card emulation (HCE) mobile services market.
25 Feb, 2015Airports confront physical access challenges
In the last several years, there has been a focus on the safety and security of airports, as the challenges these facilities face are ever evolving. Despite tight security in and around the gate areas, airport facilities are by their nature open to the public – a fact that poses a major hurdle when it comes to physical security.
25 Feb, 2015Balancing usability with strong authentication
There is a dichotomy between the authentication practices of an employee versus those of the consumer or home user. An employee is influenced by a paycheck and the corporate IT department and as long as they’re being paid, the IT department specifies and directs what type of authentication strength the employee is required to use.
23 Feb, 2015New tools for modern identity
Adaptive and mobile biometric techniques usher in a more secure future
There is a change on the horizon in identity management? Modern identity presents many new challenges – particularly with user authentication. Two new technologies are here to stay to help address the new challenges – adaptive and mobile biometric authentication.