Firewall Chats, S. 2, Ep. 2: Exploring Biometric Data

By | March 1st, 2016|Firewall Chats|

Almost five years ago, Facebook announced the debut of its facial recognition software, DeepFace, to make tagging photos of friends easier for users. The news spurred many articles questioning how exactly the technology worked and what steps could be taken to maintain privacy. Today, having software instantly identity faces in our photos seems almost commonplace. [...]

News Recap: Facelock provides a new biometrics-based password alternative

By | June 27th, 2014|Uncategorized|

Passwords are tough to remember, which is why researchers at the Universities of York and Glasgow are testing a new alternative to passwords: Facelock. This new password alternative allows a user to look at a grid of faces and single out one familiar face into order to log in securely to a website.Rob Jenkins, the [...]

Evolution of Identity Management

By | February 6th, 2014|Uncategorized|

Protecting your identity isn’t as cut and dry as it was before the digital age. Before the internet, identity thieves would find personal data by hunting through the garbage for sensitive documents, phishing for private information via phone rather than email or purchasing personal data from unscrupulous store employees.Now, with advances in technology, identity thieves [...]

Our SXSWi Panel Picks

By | March 1st, 2013|Uncategorized|

Austin is a-buzz with preparations for the 2013 SXSW Interactive Festival, and we're so excited for it to kick off! For those of you attending this year's events, here is a list of panels covering biometrics, identity, big data including healthcare, reputation management and privacy. And if you're still in search of a place to [...]

Forget Passwords: Here comes FIDO

By | February 21st, 2013|Uncategorized|

We’ve talked a lot about passwords on this blog, including how ineffective they are as a method of authentication. Over the past decade, many businesses, government organizations and non-profits have been trying to solve the password conundrum and come up with an authentication method that is secure, easy and simple enough that your grandmother can [...]

Load More Posts