Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious

Pity the poor password. Maligned for years, it’s nevertheless still hanging on as the dominant form of access and identity protection for online accounts of all types. Despite years of industrywide efforts to educate users about the importance of employing difficult-to-guess passwords, the list of the most frequently used passwords has changed little. One analysis of 10…

Getting Started with IoT Security in Healthcare

There’s a hazard that comes with introducing any new element into patient care whether it’s a new drug or a connected device. These four steps will help keep patients safe. It’s estimated that by 2025, more than 30 percent of all Internet of Things (IoT) devices will be dedicated to the realm of healthcare – more than…

Why do we need a risk-based approach to authentication?

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe. Today, however, the…

Windows Hello Face Recognition Tricked by Photo

The facial recognition-based authentication system in Windows Hello has been bypassed by researchers using a printed photo, but the method does not work in the latest versions of Windows 10. Windows Hello, a feature available in Windows 10, allows users to quickly and easily log into their devices using their face or fingerprints. The face…

Preparing for the iPhone X and the Future of Facial Recognition Technology

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducing the…

Would you let Amazon unlock your door?

Amazon recently announced the launch of the Amazon Key, allowing the Amazon delivery person to open your door in order to place your package inside, where presumably it will be safe from theft, the weather, roaming wolf packs, bears, and general mishap. Not all the commentary about this service (and associated camera, lock, etc.) have been…

Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the problem. How do you manage password security? More than half of IT executives surveyed rely on employees alone to monitor their own password behavior, subsequently leaving the company at risk,…

How Apple’s Face ID works, learns, and protects

Apple has unveiled a new version of its privacy page and a paper throwing more light on how Face ID, its newest biometric authentication option, works on iPhone X (“Ten”). The former places even more importance on security and privacy features and policies, something that Apple is becoming even more vocal about than before. It’s abundantly clear that Apple…

Researchers Use Heart Rhythms for Continuous Authentication

Researchers from the University at Buffalo SUNY, and the Department of Electrical and Computer Engineering at Texas Tech University have proposed a novel new continuous user authentication method using cardiac motion (a heart-based function determined by users’ unique heart geometry). Their paper, ‘Cardiac Scan: A Non-Contact and Continuous Heart-Based User Authentication System’ (PDF), will be…

Addressing security concerns around connected ecosystems

The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security concerns around connected ecosystems. Pervasive security through context-aware access control is one of the future areas currently being explored by developers.