After fingerprints, iris recognition is the second most supported biometric characteristic, and its popularity as a means of authentication is growing.
Patrick Grother is among the computer scientists at the National Institute of Standards and Technology's Information Technology Laboratory who are collaborating...
Information security - it's now a major national priority, and it's also the subject of a new Master's of Science program at East Stroudsburg University. This unique, online graduate program debuts on Aug. 31, and in an exclusive interview ESU professor N. Paul Schembari discusses:
The program's unique...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
OK, back home and back in the office fulltime after a couple of weeks on the road to California for the RSA Conference and a bit of R&R. Some observations as I clear my desk ...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
As companies grow, the increase in employees can pose a serious concern, as security personnel are employed to help ensure the safety of employees. There are numerous measures that can be taken to improve physical security, and their cost-effectiveness should be considered before installation. Some methods of...
There's a lot to think about beyond the security cameras, guards and locks. That's why we made physical security one of our earliest priorities this year, and why you should give it equal consideration.
Following is a recap of the physical security stories we've presented so far this year.
ATMs - they're a valuable extension of your financial institution, and they are viewed by customers as an essential part of consumer banking. Always available; always ready to provide a variety of transactions, including cash.
Yet with an estimated 1.5 million ATMs now in place globally at U.S. financial institutions...
The move to biometric authentication for customers and internal users is a tough decision for some institutions to make. But at Purdue Employees Federal Credit Union, based in West Lafayette, IN., the move was made more than 12 years ago, and the credit union continues to employ this method with positive...
The science fiction movies from the 1960s had talking computers that interacted with humans. That was considered a far-fatched idea in its time, but the current state of technology for voice biometrics and voice recognition has brought the standard up to a level where banks, including major international entities as...
Hear about the current state of call center authentication.
Learn how to apply voiceprint technology to strong authentication for your Financial Institution.
Find out how the FFIEC Guidelines apply to telephone banking and call centers.
Biometrics, the use of electronically- stored records of physical identifiers that corroborate a person's identity, is now moving out of the realms of fiction and into everyday life. Already there are reports that more than 60 hospitals in the UK use fingerprint technology to access patient files. Commercially, the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.