authentication - News, Features, and Slideshows

News about authentication
Tutorials about authentication
Features about authentication
  • What Are the Most Overrated Security Technologies?

    The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?

    Bill Brenner | 25 Mar | Read more

  • Biometrics: What, Where and Why

    Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems.

    Mary Brandel | 25 Mar | Read more

Whitepapers about authentication