Confirming and managing identities has a vital role in mitigating risk and addressing such wide-ranging challenges as physical and logical access control, insurance fraud, time and attendance records, and even ensuring a patient gets the right medication in a hospital.
Perdue University researchers are working on technology that could enable users to replace passwords with iris or fingerprint scans, The Associated Press reports.
The researchers are testing emerging biometric technologies for weaknesses in the basement lab of Perdue University’s International Center for Biometrics Research. Iris and fingerprint scans, as well as facial and voice recognition, are just a few of the tools that could eliminate the need to frequently change passwords.
While some see security video as the current fair-haired security solution, well, look again. Today, and into the future, a primary driving force comes wrapped in the concept of identity, credential and access management. It goes way beyond the early days of pioneering Wiegand effect cards, interestingly owned by Echlin, a car parts manufacturer that first used the technology in vehicle distributors.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!