Tag: Biometrics

Is software eating NFC?

An interesting debate has been open on NFC mobile payments services moving from hardware to software-based solutions. But with the risk of an increase in fraud is still a main concern. We feel that software coupled with hardware-based authentication might be the answer.

Are passwords dead yet?

Despite frequent reports of email hacks and enterprise data breaches, the username and password method for authentication is still one of the primary security measures used today. How do we create secure online identities?

Thoughts on Google’s Two-Factor Authentication – Part One

I read an interesting post by Chris Ripley on BlogCritics last week, looking at Google’s two-factor authentication. In case you missed its recent announcement, the search giant has made two-factor authentication available on its email accounts worldwide. This is a great step in the right direction and it’s fantastic to see people like Chris supporting the […]

Wallet Wars – Coming to a Mobile Near You Soon

I was recently at the Wallet Wars conference in New York hearing about the opportunities and challenges that the mobile wallet space offers. And what a spectacle it was! In such a fast-moving and evolving industry, it can be hard to keep up with the latest players: Square, Apple, Google, Samsung and Microsoft are all […]

The Next Frontier of Drivers’ Licenses

In the United States, a driver’s license is used for much more than driving; it is often used as a primary source of identification (in lieu of a national ID card) for employment, domestic travel, banking, purchasing, and more.  But many states lag behind in using the latest security technology in their drivers’ licenses, leaving […]

Why we can’t just rely on central databases for authentication

We now live in an age where reliable and fast information is of paramount importance in our daily lives. Whether banking, communicating, negotiating, or doing any form of business, information on-demand is crucial. Unfortunately, as we’ve become more dependent on access to on-demand banking, contact details, messaging etc., we’ve at times allowed vulnerabilities into our […]