Security

How Polycarbonate is Creating More Secure Passport Datapages

Passport technology is changing from the paper of the past. In the last 15 years, more than 150 countries have moved to a highly secure electronic passport that uses an inlay to support a microcontroller chip. Still, the strongest trend in passports is a polycarbonate (PC) datapage. As of today, more than 40 countries have upgraded their travel documents from the standard paper-and-laminate datapage to a PC one. This technology comes with a few challenges—and many benefits. Let’s take a look at some common questions surrounding PC.

When It Comes to Security Features, Less Is More

Identity documents have come a long way since their introduction in 1414 by King Henry V of England, as part of the Safe Conduct Act. For the next 500 years, various proofs of identity emerged but most people didn't need to carry one. The need to use identity documents not only for identifying but also authenticating the holder of the document became apparent during the first year of World War I with the Lody spy scandal.

Continuous Authentication: Security for an Evolving Threat Landscape

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or misplaces a mobile phone. If a user authenticates only at login, credential misuse mid-session can go unnoticed.

A Brief History of the Password & Why It Matters



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking


Personal Background Checks and How To Best Manage Personal Data

Background checks. Governments, corporations, healthcare organizations and financial institutions require them as part of their hiring process. They help identify individuals who have criminal backgrounds and therefore are ineligible for employment. Background checks help organizations reduce their risk, comply with legal requirements, ensure public safety and provide customer assurance.

Protecting Biometrics at Rest, an Essential Tutorial

Biometric authentication is fast and convenient. Touch your phone and it is unlocked. Look through an iris scanner and enter a secure room. Speak into your phone for hands-free authentication. Governments, law enforcement, airports, and corporations use it. However, is biometric authentication that simple? Not really when you consider the policy issues, privacy concerns, and complexity of biometric data protection.

Many Small Steps to Enhanced Passport Security

The real value of security components

A huge number of people cross borders every hour, many of them by air. If you consult flight radar apps, where one can follow every airplane currently in the air, air traffic is sometimes so heavy that you are not even able to spot a patch of sky amongst flight paths. It is estimated by the International Aviation Trade Association (IATA) that the number of travelers will double in the next twenty years. The world is becoming a smaller place.

Four Questions to Ask Your Identity and Access Management Vendor

Strong identity and access management (IAM) is vital to securing your business against cyber attacks, thwarting social engineering attempts and stopping hackers from stealing credentials. You need a solution that provides robust authentication and authorization, balanced with ease of use, to secure your sensitive data and systems.

With so many IAM solutions on the market, how do you choose the right one for your business?

Inline Personalization Simplifies College ID Issuance

Smart Schools are Seeing the Benefits of Smart Cards

Creating Trusted Identities Starts with Trusting Your IAM Vendor

Finding the right identity and access management (IAM) solution can be a challenge. With dozens of vendors and products in the marketplace, how do you pick the right one? The following is a guide to help you identify the unique needs, challenges and various factors in your organization to consider when selecting the perfect IAM solution and vendor to meet your security goals.

Pages

Subscribe