Industry blog

Posted: 22 May 2019
ilowe's picture

What is it?

Wikipedia defines Augmented Reality (AR) as, “an interactive experience of a real-world environment where the objects that reside in the real-world are ‘augmented’ by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory, and olfactory.”

More simply put, AR technology superimposes a...

Continue reading >>
Posted: 16 May 2019
aletan's picture

As he waits to travel outside the EU, a man stands in the border control line to get his passport checked. He is a bit nervous, but his passport does not take any longer to get checked than the passport of the traveller before him. The border control officer takes a quick look at the security features on the polycarbonate data page and the security thread, the data is read from the MRZ and we’...

Continue reading >>
Posted: 15 May 2019
jmacinnis's picture

The oil and gas and critical infrastructure industries were the #1 targets by nation-state sponsored cyberthreat actors in 2017-18. Cyberattacks pose a significant threat causing major business disruption, downtime and loss of intellectual property. Rapid digitization of production tools across the industry can also increase the threat landscape unless properly mitigated.


Continue reading >>
Posted: 08 May 2019
bdegonia's picture

Every day law enforcement, border control and other agencies use official documents to confirm a person’s identity. But what happens when the person they encounter doesn’t possess an acceptable document, or when the document they do have doesn’t appear to be genuine? In today’s world, it’s increasingly important to know the real identity of a person to determine if they are a threat.

... Continue reading >>
Posted: 15 Apr 2019's picture

Passwords remain a significant cybersecurity risk for organizations of all sizes.

With Password-related attacks on internet-facing applications as well as internal applications ranging from phishing, guessing weak passwords, password stuffing and keyloggers to rainbow tables, social engineering, and...

Continue reading >>
Posted: 12 Apr 2019
rmegonigal's picture

When employing biometrics, there is a balance between privacy and security. Government entities are entrusted with keeping their citizens safe from both external and internal threats and biometrics are a useful tool to meet this expectation. However, there is a risk that corrupt governments can use biometrics to monitor citizens on issues not directly related to security, thus violating their...

Continue reading >>
Posted: 11 Apr 2019
amalpani's picture

What is Intellectual Property?

An organization’s intellectual property (IP) ranges from information about a process or the secret sauce for a particular product to patents filed by employees or an organization’s client list. The World Intellectual Property Organization (WIPO) defines IP as creations of the mind such as inventions, literary or artistic works, designs, symbols, names...

Continue reading >>
Posted: 09 Apr 2019
jhinmon's picture

Today is Internet of Things (IoT) Day, which means it’s the perfect time to explore how this brave new world of smart devices has changed the way we do business—and how we think about security. For over a decade, the concept of IoT has been attracting buzz from tech enthusiasts, business leaders, and consumers alike. While internet-connected devices have been around for much longer (like the...

Continue reading >>
Posted: 22 Mar 2019
fjacquot's picture

When it comes to identity documents, the picture is the aspect most often forged. Why? Because photos most visibly connect documents to their rightful owners. Fortunately, there are many ways to secure the picture to make sure that the person captured on the document is in fact the person being presented for identification to the verifier.


Continue reading >>
Posted: 04 Mar 2019
SWarne's picture

Exciting new products and processes such as mobile and digital IDs, innovative visions of frictionless borders and improved traveler experiences are emerging in the identity market. Given the potential benefits to citizens and governments alike, it is impossible not to wonder why these products and processes face such slow adoption.


Continue reading >>