Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

Biometrics

Below you will find reports with the tag of “Biometrics”

image from The C-Suite Report: The Current State and Future State of Cybersecurity

The C-Suite Report: The Current State and Future State of Cybersecurity

This report comes from a survey conducted by WSJ Intelligence and sponsored by Forcepoint. It explores the current state of cybersecurity as well as challenges that lie between current cybersecurity systems and risks going forward. (more available)
Added: June 21, 2020
image from 2020 Global Identity and Fraud Report

2020 Global Identity and Fraud Report

Experian’s 2020 Global Identity & Fraud Report explores inconsistencies between businesses’ views of their ability to meet their customers’ needs, and customer experiences with those businesses. (more available)
Added: May 8, 2020
image from Exabeam 2019 State of The SOC Report

Exabeam 2019 State of The SOC Report

A survey driven report across the US and UK geographies on organization’s SOC capabilities.
Added: April 29, 2020
image from The 3rd Annual Global Password Security Report

The 3rd Annual Global Password Security Report

In our 3rd annual Global Password Security Report, we strive to share interestingand helpful insights into employee password behavior at businesses around theworld. (more available)
Added: March 29, 2020
image from The Evolution of Authentication

The Evolution of Authentication

This report discusses the problems with passwords, “The problem is that passwords, 2FA and legacy multi-factor authentication solutions have one thing in common – they rely on shared secrets. (more available)
Added: July 10, 2019
image from Web Fraud Prevention, Online Authentication & Digital Identity Market Guide 2015/2016

Web Fraud Prevention, Online Authentication & Digital Identity Market Guide 2015/2016

This report offers the latest trends and insights into securing digital identities and transactions.
Added: February 13, 2019
image from Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

Digital Transformation In The Insurance Sector: How Behavioral Biometrics is Paving The Way To Less Fraud, Less Friction and More Functionality

From the report, “The widespread digitization of financial services is causing large-scale and sweeping transformations across various facets of the business, creating new growth opportunities but also new challenges and inherent risk. (more available)
Added: February 13, 2019
image from High Score: Set A Revenue High Score By Defeating Video Game Fraud

High Score: Set A Revenue High Score By Defeating Video Game Fraud

From the report, “Each marketplace has to approve each game being sold, which gives your company credibility. Consumers also have the ability to rate the games with reviews in order to warn others about a game or a developer. (more available)
Added: February 13, 2019
image from From Login to Logout: Continuous Authentication with Behavioral Biometrics

From Login to Logout: Continuous Authentication with Behavioral Biometrics

This report offers insight into authentication. It discusses some key problems with various standard authentication processes and highlights ways that authentication can be improved. (more available)
Added: February 13, 2019
image from Behavioral Biometrics in a PSD2 World

Behavioral Biometrics in a PSD2 World

This report offers insight into the changes occurring in the financial services industry as relates to the revised Payment Services Directive (PSD2). (more available)
Added: February 13, 2019
image from The Role Of Applicant Behavior In Identity Proofing

The Role Of Applicant Behavior In Identity Proofing

As account opening continues to transition from physical to digital channels, financial institutions, issuers, lenders, and other organizations must optimize the digital experience of applicants in order to compete. (more available)
Added: February 13, 2019
image from Changing Data Breach Notification Laws: Regulatory Trends

Changing Data Breach Notification Laws: Regulatory Trends

From the report, “Analyzing this flurry of legislative activity in 2018, we have identified a number of continuing trends. In general, the overarching trend is increasing stringency and growing complexity in breach notification obligations. (more available)
Added: February 9, 2019
image from Forging Documents in the Deep and Dark Web

Forging Documents in the Deep and Dark Web

This report offers insight into forged documents online. And how they are traded and used to commit identity fraud or evade authorities. (more available)
Added: January 31, 2019
image from Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

Gobal Consumers' Authentiacation Preferences: Have Your Cake and Eat It Too

This Impact Report provides insights into consumers’ views on authentication. Consumers often don’t understand the mechanics of technologies very well, or even why they’re being used, but they have definite preferences about how and when they want to engage in authentication activities. (more available)
Added: January 31, 2019
image from The State Of IOT Security

The State Of IOT Security

This report offers the following taglines - IoT device breaches undetectable by nearly half of companies, and use of blockchain technology to help secure IoT data, devices and services doubles in a year. (more available)
Added: January 30, 2019
image from Creating Value and Managing Risk in the World of PSD2

Creating Value and Managing Risk in the World of PSD2

Creating)Value)and)Managing)Risk)in)the)World)of)PSD2,“a"white"paper"developed"by"Aite"Group” in close cooperation with ThreatMetrix, provides insight into the key provisions of the revised & Payment(Service(Directive (PSD2) legislation and its impact on market practices. (more available)
Added: January 30, 2019
image from Enhancing Digital Capabilities And Countering Fraud With Advanced Device Intelligence

Enhancing Digital Capabilities And Countering Fraud With Advanced Device Intelligence

A survey of financial services executives responsible for digital security measures at their firms (see Methodology) sheds light on the industry’s objectives for digital channels, perceptions about the scale of the threat posed by fraud and a range of vectors for attack, and confidence in existing defenses. (more available)
Added: January 15, 2019
image from Threat Intelligence Bulletin: Deloitte Breach

Threat Intelligence Bulletin: Deloitte Breach

This report, prepared by CyberInt, summarises the currently known information regarding the recent breach at Deloitte, one of the ‘big four’ accounting firms, and includes a timeline of events, what is known of the breach itself as well as the aftermath. (more available)
Added: December 5, 2018
image from Smartphones, Tablets, and Fraud: When Apathy Meets Security

Smartphones, Tablets, and Fraud: When Apathy Meets Security

Consumers rely on their mobile devices on an ever‐growing basis to keep them connected. Smartphones and tablets provide them with access to each other through email, messaging, and social media while also putting financial services and shopping in the palm of their hands. (more available)
Added: November 27, 2018
image from Biometrics And Privacy: On Device vs On Server matching

Biometrics And Privacy: On Device vs On Server matching

This paper sets out the key privacy implications of processing biometric data in the EU and Switzerland, Canada, USA and the Asia Pacific region (covering Japan, Singapore, Hong Kong and Australia). (more available)
Added: November 27, 2018
image from Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy, commissioned by Nok Nok Labs and produced by Aite Group, explores current attitudes and trends in developing an organization-wide consumer authentication strategy. (more available)
Added: November 27, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2021
Library updated: March 6, 2021 20:09 UTC (build 7e736b2)