Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Biometrics

Below you will find reports with the tag of “Biometrics”

image from 2022 State of Access Report

2022 State of Access Report

1Password’s 2022 State of Access Report, an annual survey of North American workers’ sentiments and behaviors around cybersecurity and other critical aspects of modern work, reveals that the acute burnout detected in last year’s survey has paved the way for a widespread sense of distraction in a time of “permacrisis.” When security protocols and practices aren’t automated, even the most well-intentioned employees can unwittingly cause a breach.

(more available)
Added: October 30, 2024
image from OWASP MASVS Benchmark Report

OWASP MASVS Benchmark Report

OWASP MASVS sets a minimum bar for mobile app developers to follow when building apps securely and provides security teams with the ideal testing strategy as part of the organization’s proof of controls. NowSecure benchmark mobile application security testing analysis shows 95% of nearly 6,500 leading mobile apps fail at least one of the seven OWASP MASVS categories.

(more available)
Added: September 4, 2024
image from 2021 Sysadmin Report

2021 Sysadmin Report

To celebrate Sysadmin Day 2021, we surveyed 732 sysadmins from a variety of organizations worldwide to learn how the exceptionally weird year affected them and their organizations. This special report details what we discovered and celebrates the power and resistance of sysadmins, the very heart of the IT force!

(more available)
Added: October 31, 2022
image from 2021 Remote Workforce Security Report

2021 Remote Workforce Security Report

This 2021 Remote Workforce Security Report reveals the state of securing the new workforce. The report explores key challenges and unique security threats faced by organizations, technology gaps and preferences, investment priorities, and more.

(more available)
Added: October 18, 2022
image from The 2020 Duo Trusted Access Report

The 2020 Duo Trusted Access Report

For the 2020 Duo Trusted Access Report, our data shows that more organizations across all industries are enabling their workforces to work from home now, and potentially for an extended period of time. They’re also implementing the appropriate security controls to ensure secure access to applications. In this report, we’ll look at how companies are currently securing remote work and what makes a solid and secure remote access strategy.

(more available)
Added: June 15, 2022
image from The 2021 Duo Trusted Access Report

The 2021 Duo Trusted Access Report

Drawing on Duo’s customer basis of millions of devices and the authentication traffic associated with them between June 2020 and May 2021, this report reviews trends in authentication methods and includes firmographic breakdowns.

(more available)
Added: October 17, 2021
image from The C-Suite Report: The Current State and Future State of Cybersecurity

The C-Suite Report: The Current State and Future State of Cybersecurity

This report comes from a survey conducted by WSJ Intelligence and sponsored by Forcepoint. It explores the current state of cybersecurity as well as challenges that lie between current cybersecurity systems and risks going forward.

(more available)
Added: June 21, 2020
image from 2020 Global Identity and Fraud Report

2020 Global Identity and Fraud Report

Experian’s 2020 Global Identity & Fraud Report explores inconsistencies between businesses’ views of their ability to meet their customers’ needs, and customer experiences with those businesses. It also underscores the opportunity for companies like yours to differentiate from the competition through the ways you engage with customers, with emphasis on how you identify and recognise them each time they interact with your business. Experian appreciates that many companies find it challenging to evolve traditional business models in order to meet the expectations of ‘always-on’ customers. But we also believe that customers’ identity verification and ongoing recognition (re-recognition) can be driving forces for greatly improved and more profitable customer relationships.

(more available)
Added: May 8, 2020
image from Exabeam 2019 State of The SOC Report

Exabeam 2019 State of The SOC Report

A survey driven report across the US and UK geographies on organization’s SOC capabilities.

Added: April 29, 2020
image from The 3rd Annual Global Password Security Report

The 3rd Annual Global Password Security Report

In our 3rd annual Global Password Security Report, we strive to share interestingand helpful insights into employee password behavior at businesses around theworld. We want to help IT and security professionals understand the greatestobstacles employees face when it comes to passwords, learn how to addresschallenges of managing and securing data in today’s digital workplace and enablethem to see how their businesses’ password security practices measure up. Thisyear, we’re bringing even more data points to the table.

(more available)
Added: March 29, 2020
image from The Evolution of Authentication

The Evolution of Authentication

This report discusses the problems with passwords, “The problem is that passwords, 2FA and legacy multi-factor authentication solutions have one thing in common – they rely on shared secrets. That means that a user has a secret, and a centralized authority holds the same secret. When authenticating, those two secrets are compared to approve user access. If a malicious 3rd party intercepts the secret, they can impersonate the user. The bad news is that this reliance on shared secrets has kept large populations of users vulnerable to phishing, credential stuffing attacks, and password reuse while contributing to the steep rise in Account Take Over (ATO). The good news? The Digital Identity landscape is about to change very quickly.”

(more available)
Added: July 10, 2019
image from Web Fraud Prevention, Online Authentication & Digital Identity Market Guide 2015/2016

Web Fraud Prevention, Online Authentication & Digital Identity Market Guide 2015/2016

This report offers the latest trends and insights into securing digital identities and transactions.

Added: February 13, 2019
image from Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

From the report, “The widespread digitization of financial services is causing large-scale and sweeping transformations across various facets of the business, creating new growth opportunities but also new challenges and inherent risk. In the insurance sector, particularly, digital transformation is driven by new competitive threats, ongoing cost pressures, aging technology and increasing regulatory requirements. Put all together, there is a huge opportunity to modernize, to create new business models, acquire customers on new channels and create competitive and compelling customer experiences. ” Read on to find out more.

(more available)
Added: February 13, 2019
image from High Score: Set A Revenue High Score By Defeating Video Game Fraud

High Score: Set A Revenue High Score By Defeating Video Game Fraud

From the report, “Each marketplace has to approve each game being sold, which gives your company credibility. Consumers also have the ability to rate the games with reviews in order to warn others about a game or a developer. Adding the consumer reviews is a layer of credibility for your game, as long as the reviews are positive. Being able to sell games directly online is great for merchants, but also opens them up to the possibility of fraud and chargebacks.” Read on to find out more.

(more available)
Added: February 13, 2019
image from From Login to Logout: Continuous Authentication with Behavioral Biometrics

From Login to Logout: Continuous Authentication with Behavioral Biometrics

This report offers insight into authentication. It discusses some key problems with various standard authentication processes and highlights ways that authentication can be improved.

(more available)
Added: February 13, 2019
image from Behavioral Biometrics in a PSD2 World

Behavioral Biometrics in a PSD2 World

This report offers insight into the changes occurring in the financial services industry as relates to the revised Payment Services Directive (PSD2).

(more available)
Added: February 13, 2019
image from The Role Of Applicant Behavior In Identity Proofing

The Role Of Applicant Behavior In Identity Proofing

As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise as criminals have become more successful than ever, thanks to some of the same digital channel benefits enjoyed by consumers: convenience, speed, and ease of use. To achieve the necessary balance between preventing fraud and providing a delightful experience for consumers, an approach to identity proofing that accounts for the channel, product, customer, and threat environment is absolutely critical. But regardless of the approach, inconspicuous solutions — like those based on applicant behavior — have a distinct role to play in how institutions manage the risk of application fraud.

(more available)
Added: February 13, 2019
image from Changing Data Breach Notification Laws: Regulatory Trends

Changing Data Breach Notification Laws: Regulatory Trends

From the report, “Analyzing this flurry of legislative activity in 2018, we have identified a number of continuing trends. In general, the overarching trend is increasing stringency and growing complexity in breach notification obligations. In the following pages, we’ll break down this overarching trend into separate and distinct trends. We’ll also look at what these trends mean for how privacy and security professionals work today.”

(more available)
Added: February 9, 2019
image from Forging Documents in the Deep and Dark Web

Forging Documents in the Deep and Dark Web

This report offers insight into forged documents online. And how they are traded and used to commit identity fraud or evade authorities.

(more available)
Added: January 31, 2019
image from Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

This Impact Report provides insights into consumers’ views on authentication. Consumers often don’t understand the mechanics of technologies very well, or even why they’re being used, but they have definite preferences about how and when they want to engage in authentication activities.

(more available)
Added: January 31, 2019
image from The State Of IOT Security

The State Of IOT Security

This report offers the following taglines - IoT device breaches undetectable by nearly half of companies, and use of blockchain technology to help secure IoT data, devices and services doubles in a year.

(more available)
Added: January 30, 2019
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)