Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Biometrics

Below you will find reports with the tag of “Biometrics”

image from Securing A Digital Retail Enterprise

Securing A Digital Retail Enterprise

This whitepaper explores the necessary steps for securing a retail enterprise in a digital world.

Added: October 22, 2018
image from Western Europe Security 2016 Predictions

Western Europe Security 2016 Predictions

A thorough infographic detailing predictions for the future of Western Europe Cyber security.

Added: October 21, 2018
image from A 360-Degree Guide To Choosing And Migrating To A New Email Client

A 360-Degree Guide To Choosing And Migrating To A New Email Client

This white paper seeks to offer some insight into migrating to a new email client.

Added: October 19, 2018
image from Biometrics: Introducing The Future Of Authentication

Biometrics: Introducing The Future Of Authentication

This report takes a look at Biometrics and how it can become a great cybersecurity measure.

Added: October 19, 2018
image from Build Vs. Buy: Evaluating Identity Management

Build Vs. Buy: Evaluating Identity Management

Every corporation struggles with the decision to Build or Buy an identity management platform. This report seeks to offer advice to aid in that decision.

(more available)
Added: October 18, 2018
image from Data Protection By Design

Data Protection By Design

This paper provides a brief summary of the necessary preparations for becoming GDPR Compliant

Added: October 17, 2018
image from Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

Matty McMattface:Security Implications, Mitigations & Testing Strategies For BioMetric Facial Recognition Services

This paper discusses the security issues related to biometric facial recognition applications.

Added: October 17, 2018
image from Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

Impersonation Protect: A Whale Of A Tale: How To Stop The Rising Tide Of Impersonation Attacks

This report takes a look at whaling attacks and considers what can be done to stop these kinds of attacks.

(more available)
Added: October 15, 2018
image from Moving Beyond The Password: Consumers' Views On Authentication

Moving Beyond The Password: Consumers' Views On Authentication

In this research effort, sponsored by iovation, Aite Group surveyed 1,095 U.S. consumers who use online and/or mobile banking in January 2017 to better understand their attitudes toward and understanding of various authentication mechanisms.

(more available)
Added: October 15, 2018
image from Simplifying Mobile App Integration With SDKs

Simplifying Mobile App Integration With SDKs

If you’re looking for a paper that talks about Mobile App Integration, this paper is for you.

Added: October 15, 2018
image from A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

This paper discusses how the GDPR will affect you as a non-European company and provides insights into what you should do to prepare.

(more available)
Added: October 14, 2018
image from Next-Gen Biometric Authentication

Next-Gen Biometric Authentication

Much helpful information about Biometric Authentication is revealed in this interview with InAuth Chief Strategy Officer Michael Lynch.

Added: October 14, 2018
image from Supply Chain Compliance

Supply Chain Compliance

This paper discusses the important new rules in the DFARS cyber clause. It seeks to help organizations by revealing key steps to becoming compliant.

(more available)
Added: October 14, 2018
image from The Mobile Device: The Center Of The Fraud Prevention Universe

The Mobile Device: The Center Of The Fraud Prevention Universe

From The Report, “A vision is emerging that balances effective fraud prevention with a delightful customer experience…The mobile device sits at the center of this vision. Properly secured, the mobile device can not only facilitate safer transactions within its own channel but can also be used to better secure other channels with minimal customer friction. This white paper will delve deeper into this vision and the roadmap for forward-thinking fraud executives."

(more available)
Added: October 14, 2018
image from Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

Chat, Tap, Talk: Eight Key Trends To Transform Your Digital Customer Experience

This report analyzes the digital improvements to business communication and how you can use that to improve your ability to reach your audience.

(more available)
Added: October 13, 2018
image from GDPR Headlines

GDPR Headlines

Centrify has worked with the specialist law firm, Cordery, to develop this headline summary of when the GDPR applies, the key impacts and what you need to do to comply with the GDPR.

(more available)
Added: October 12, 2018
image from Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

Speed And Security: Promises, Perils, And Paradoxes Of Accelerating Everything

This RAND Perspective suggests that technological develop- ments and social dynamics are working in tandem to shift society into hyperdrive, which can usher in unprecedented security concerns. Despite the potential for increased speed as 2040 nears, the authors assert that this phase of acceleration is neither uniform nor determin- istic. Without knowing the future, we can still have the foresight to prepare for security in an age of increasing speed and find value in having collaborative discussions about the role of speed as a catalyst within future global risk and security.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2025
Library updated: June 22, 2025 00:08 UTC (build b1d7be4)