Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Biometrics

Below you will find reports with the tag of “Biometrics”

image from Creating Value and Managing Risk in the World of PSD2

Creating Value and Managing Risk in the World of PSD2

Creating)Value)and)Managing)Risk)in)the)World)of)PSD2,“a"white"paper"developed"by"Aite"Group” in close cooperation with ThreatMetrix, provides insight into the key provisions of the revised & Payment(Service(Directive (PSD2) legislation and its impact on market practices.

(more available)
Added: January 30, 2019
image from Enhancing Digital Capabilities And Countering Fraud With Advanced Device Intelligence

Enhancing Digital Capabilities And Countering Fraud With Advanced Device Intelligence

A survey of financial services executives responsible for digital security measures at their firms (see Methodology) sheds light on the industry’s objectives for digital channels, perceptions about the scale of the threat posed by fraud and a range of vectors for attack, and confidence in existing defenses.

(more available)
Added: January 15, 2019
image from Threat Intelligence Bulletin: Deloitte Breach

Threat Intelligence Bulletin: Deloitte Breach

This report, prepared by CyberInt, summarises the currently known information regarding the recent breach at Deloitte, one of the ‘big four’ accounting firms, and includes a timeline of events, what is known of the breach itself as well as the aftermath.

(more available)
Added: December 5, 2018
image from Smartphones, Tablets, and Fraud: When Apathy Meets Security

Smartphones, Tablets, and Fraud: When Apathy Meets Security

Consumers rely on their mobile devices on an ever‐growing basis to keep them connected. Smartphones and tablets provide them with access to each other through email, messaging, and social media while also putting financial services and shopping in the palm of their hands. And each and every one of these activities holds value for criminals in search of account credentials and personally identifiable information (PII) to sell or misuse. Unfortunately, for all of the potential that mobile devices represent, the apathy of every mobile stakeholder is undermining the security of mobile devices and the accounts of their users. Protecting Android, iOS, and Windows mobile device users from fraud will require a concerted effort by all stakeholders to eliminate vulnerabilities, encourage security‐minded behaviors, and to leverage all the security benefits that mobile devices have to offer.

(more available)
Added: November 27, 2018
image from Biometrics And Privacy: On Device vs On Server matching

Biometrics And Privacy: On Device vs On Server matching

This paper sets out the key privacy implications of processing biometric data in the EU and Switzerland, Canada, USA and the Asia Pacific region (covering Japan, Singapore, Hong Kong and Australia). This paper will touch on legislation and best practice recommendations in these jurisdictions without going into the details of specific laws.

(more available)
Added: November 27, 2018
image from Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy

Creating an Authentication Framework: The Future of Authentication Strategy, commissioned by Nok Nok Labs and produced by Aite Group, explores current attitudes and trends in developing an organization-wide consumer authentication strategy.

(more available)
Added: November 27, 2018
image from 2018 Consumer Survey: Attitudes And Behavior In A Post-Breach Era

2018 Consumer Survey: Attitudes And Behavior In A Post-Breach Era

We are living in a world where breaches of consumer privacy are a regular phenomenon. Breaches, such as the Cambridge Analytica-Facebook snafu and the Google+ leak, have dominated headlines in 2018, exposing the personal information of millions of people and shaking our trust in big brands. Many consumers are making drastic changes to the way they interact with brands online, and they believe businesses need to take ultimate responsibility for protecting their data. Ping Identity surveyed more than 3,000 consumers across the U.S., UK, France and Germany to examine consumer attitudes in a post-breach era to help businesses maintain trust and stay ahead of their customers’ expectations.

(more available)
Added: November 27, 2018
image from 2018 State of Cybersecurity in Small & Medium Size Businesses

2018 State of Cybersecurity in Small & Medium Size Businesses

Ponemon Institute is pleased to present the results of The 2018 State of Cybersecurity in Small and Medium Size Businesses sponsored by Keeper Security. The goal of this study is to track how small and medium size companies address the same threats faced by larger companies. This report features the findings from 2018 and 2017.

(more available)
Added: November 23, 2018
image from 2018 Unisys Security Index Australia Report

2018 Unisys Security Index Australia Report

This report provides insight into the public concern about security issues in Australia in 2018.

Added: November 21, 2018
image from 2019 Forcepoint Cybersecurity Predictions Report

2019 Forcepoint Cybersecurity Predictions Report

In the 2019 Forcepoint Cybersecurity Predictions Report, we explore the impact of businesses putting their trust in cloud providers to protect their data, the impact of end-user trust in those securing personal biometric data, the cascading of trust into the supply chain to protect any critical data in their custodianship, and trust in algorithms and analytics successfully piloting automobiles and alerting security professionals to potential data loss incidents.

(more available)
Added: November 20, 2018
image from Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

Understanding The Pending U.S. Data Breach Prevention and Compensation Act of 2018

This special report provides information related to the Harbinger of a U.S. National Data Protection Law.

Added: November 20, 2018
image from Accenture 2017 Internet Of Health Things Survey

Accenture 2017 Internet Of Health Things Survey

This report offers a fine summary of the Internet of Health Things, and covers the many issues related to this growing industry.

(more available)
Added: November 20, 2018
image from Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

Iranian Threat Agent Greenbug Impersonates Israeli HighTech and Cyber Security Companies

This report offers insight into the Iranian threat agent Greenbug.

Added: November 15, 2018
image from Combating False Declines Through Customer Engagement

Combating False Declines Through Customer Engagement

Based on quantitative consumer research, the report looks at the likelihood that false declines at the point of sale (POS) will prompt consumers to leave their financial institution (FI). The report also looks at technologies that can reduce false declines as well as consumers’ propensity to proactively engage with these technologies.

(more available)
Added: October 26, 2018
image from How Much Is the Data on Your Mobile Device Worth?

How Much Is the Data on Your Mobile Device Worth?

The purpose of this research, sponsored by Lookout, is to understand the value of the data we access and store on our mobile devices and if we are doing enough to protect that data.

(more available)
Added: October 26, 2018
image from The Key Things Your Whole Business Needs To Know To Be GDPR Ready

The Key Things Your Whole Business Needs To Know To Be GDPR Ready

This paper asks 5 key questions that should help your organization know what to do with their data and GDPR compliance.

(more available)
Added: October 26, 2018
image from 2016 State of SMB Cybersecurity

2016 State of SMB Cybersecurity

This report deals with the state of cybersecurity in small and medium-sized businesses. To develop this research, they surveyed 598 individuals in companies with a headcount from less than 100 to 1,000.

(more available)
Added: October 25, 2018
image from Rethink The Role Of The CMO

Rethink The Role Of The CMO

In February 2018, Accenture Interactive commissioned Forrester Consulting to evaluate the current and future role of the CMO in building and delivering experiences and the need for organizationwide collaboration. In July 2018, Forrester conducted 10 interviews and an online survey with 250 senior-level marketing decision makers from a range of industries to explore this topic.

(more available)
Added: October 25, 2018
image from The Importance Of Knowing Your Device In A Mobile-First World

The Importance Of Knowing Your Device In A Mobile-First World

This white paper will examine “Know Your Device” (KYD) as a method to not only protect against fraud, but also enhance your customer’s digital channel experiences and compete in a crowded marketplace.

(more available)
Added: October 24, 2018
image from Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

Protecting Emerging Payments Technologies: New Ways To Pay Require New Ways To Secure

If you are looking for insight into the growing world of mobile payments, and the security surrounding those transactions, this paper is for you.

(more available)
Added: October 23, 2018
image from Multi-Factor Authentication For Dummies

Multi-Factor Authentication For Dummies

This e-book provides a helpful and simple explanation of Multi-Factor Authentication.

Added: October 22, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 22, 2025 00:08 UTC (build b1d7be4)