The North American Electric Reliability Corporation (NERC) has proposed new standards to protect the nation’s power grid and public utilities infrastructure from attack. Called the Physical Security Reliability Standard (CIP-014-1), it would secure key infrastructure from physical attacks and threats.
White Papers & Webinars
Protecting healthcare from cyber attack
27 May, 2014ACLU: Facial recognition needs ethical framework
The American Civil Liberties Union submitted an “Ethical Framework for Facial Recognition” to the U.S. Department of Commerce’s National Telecommunications and Information Administration wanting group to follow specific principles when using the technology.
A new Deloitte University Press report details the importance of mobile technology in the future of payments. The report cited a number of advantages that mobile solutions can provide, including biometrics. It is capability that financial services could leverage to make customer interactions easier and more secure. As for modalities, the Deloitte report notes that […]
Weekly new briefs on Samsung committing to biometric technology; DigitalPersona announcing that New Look, a China fashion retailer, has selected a Point-of-Sale (POS) system enabled with fingerprint technology; The FIDO Alliance announced that Visa Inc. has joined; INSIDE Secure announced the launch of AT90SC28880RCFV2, a dual interface, secure microcontroller; and Fortinet, a network security provider, has invested in Centrify,
21 May, 2014Mexican bank deploys voice biometrics
Nuance announced that Banco Santander México deployed the voice biometrics solution to replace PINs, passwords, and security questions. Santander launched Nuance’s VocalPassword solution so that customers who call in to the bank’s phone system can simply speak to be authenticated, making the banking-by-phone process easier and more secure.
Toopher is touting invisible authentication but also may have one of the coolest tag lines for an identity company out there: “cool enough for James Bond and your mom can use it too.” Once an enterprise enables a site for Toopher, a user’s mobile device can serve as a second factor of authentication.
19 May, 2014Gartner maps the world of user authentication
Employees and consumers aren’t always excited to use high-assurance security technologies. One of the biggest obstacles is usability and vendors are starting to recognize this, according to Gartner’s “Magic Quadrant for User Authentication” report. Author Ant Allan notes that bring-your-own-device demands are forcing vendors to change their products and services in response. Users want sign-in to be as easy as using any other app on consumer phones. A swipe here, a PIN there is about all most are willing to do.