Michigan CTO Dan Lohrmann will head a new operation to provide state agencies with a single organization charged with the oversight of risk management and security issues associated with state assets, property, systems and networks.
"Once you identify that person based on the unique characteristics of their face, you could then match it with other databases," privacy advocate Beth Givens says, referring to privacy gaps created by facial recognition technology.
Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the...
RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.
Many organizations are considering migrating from proprietary technologies to those based on free, industry-wide standards. This will not only carve out IT costs, but also help scale your IT ecosystem and potentially improve performance. To better understand the customer migration experience, the Harvard Research...
In order to address constantly evolving fraud and theft threats, businesses are deploying multiple levels of security, of which access cards are a critical component. Innovative, print-on-demand (POD) solutions enable a new generation of "intelligent" access cards that contain various technologies such as bar code,...
The non-standardized collection device is responsible for 13 percent of the biometric records maintained by DOD, representing some 630,000 DoD records that cannot be searched automatically against FBI's database of about 94 million records.
"It you were to ask me to rank order where industries are in terms of their cybersecurity capability, I think power is at or close to the bottom of the list, says Army Gen. Keith Alexander, head of the U.S. Cyber Command Commander and National Security Agency.
The overall goal of the guidance is to achieve appropriate security assurance for multiple applications by efficiently verifying the claimed identity of individuals seeking physical access to federally controlled government facilities and electronic access to government information systems.
A preliminary draft of new online authentication guidance from the Federal Financial Institutions Examination Council puts greater responsibility on the shoulders of financial institutions to enhance security.
Office of Management and Budget Director Jacob Lew issues a directive to require 5.7 million federal employees and contractors to use personal identity verification credentials to access federal IT systems and facilities by Oct. 1.
Being able to quickly and accurately track DoD assets worldwide obviously has the potential to deliver tremendous savings in terms of time, cost, and manpower. Today, UID compliance must be factored into the enterprise considerations of both DoD program managers and supplier companies.
This whitepaper explains...
To create fraud-resistant and durable ID Cards, it's essential to choose the right card and the right printer. But before deciding on a card printing technology, you need to know some basics.
This White Paper explains:
different types of cards and printing methods (quantity and frequency);