CBA hints at plan to import "commercialised blockchain"
Commonwealth Bank of Australia has hinted at plans to import the “commercialised blockchain solution” it has successfully trialed in South Africa.
Commonwealth Bank of Australia has hinted at plans to import the “commercialised blockchain solution” it has successfully trialed in South Africa.
Consumers ranked security as more important than convenience in logging on to most kinds of app, especially those related to money, according to a global survey by IBM.
Fujitsu has unveiled authentication technology that scans the unique patterns of veins in a user's hands to identify them.
The Australian Taxation Office (ATO) has stated plans to turn on voice authentication to verify customer identities by the end of December at the latest.
Biometrics look like the future of authentication for payments, according to payment experts at the Biometrics Institute Asia Pacific Conference in Sydney.
The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?
Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems.
Considering a biometric access system? Experts offer practical advice in these dos and don'ts.
Passwords have been standing guard over our computer user accounts seemingly forever; for a long while, and for most purposes, they could go it alone.
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk