weekly cypher mobile gamification cloud biometrics

Mobile, Games, Cloud & Biometrics for Improving Cybersecurity

The Weekly Cypher is specially curated to keep you up-to-date on the latest in cybersecurity, biometrics, and related news and innovations. Here are a few of the headlines you might have missed this week:

The ‘Biometrics of Things’ Kicks Off at CES 2018 | Twice

2018 marks the beginning of the era of “Biometrics of Things” as Bio-key introduces a new padlock design that supports wireless unlocking via Windows Hello at CES 2018. The TouchLock Pro has a built-in fingerprint sensor, but can also be synced to a second device via Bluetooth to be unlocked remotely. The company noted at the event that this is just the beginning of embedded fingerprint sensors potential. [Read More]

Cybersecurity Competence in High Demand | No Jitter

It seems like we’ll never live in a world free from cybersecurity threats and attacks, meaning we need to constantly improve our ability to react and respond. One security expert suggests gamification as a way to improve security training and awareness. Beyond turning security training into a “game,” he also recommends a few tips for improving training programs and helping employees retain the information. [Read More]

Can AI Fix Cybersecurity, or Is It Also a Threat? | Xconomy

Artificial intelligence (AI) is a hot topic right now, particularly in cybersecurity. While everyone may be talking about it, however, few people are predicting the future with regard to the impact it will have. While AI’s role may be important, it is also likely to be a double-edged sword. Even as cybersecurity tools are beginning to leverage AI, so too are hackers, continuing the virtual arms race of threat and response. [Read More]

IAM Challenges, the Cloud & the Mobile Era | SecurityIntelligence

Two technologies have shaken the identity and access management field to its core in the last decade – mobility and the cloud. These two technologies are helping companies cut costs, improve productivity, and simplify the user experience for their employees, but also causing major headaches when it comes to security. Rather than backpedal, firms need tools that improve identity and access management to catch up with their other technology investments. [Read More]

Is Zero Trust the Security Answer We Need? | CSO

One of the big security problems we face today is not knowing who to trust. This has led some to consider a Zero Trust option. Traditional security models inherently trust requests from “inside” their perimeters and distrust anything “outside” of them. In the Zero Trust model, however, nothing is inherently trusted, requiring authentication for all connections and requests. While this is one way to halt the growing threat of data breaches, is it the best option? [Read More]

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

The Largest Internet Company in Mexico Taps Tec360 and Veridium for Trusted Phishing Resistant Passwordless Authentication and to secure Okta SSO A top provider of


Veridium The True Passwordless Enterprise

Veridium The True Password-less Enterprise In February 2017 when I joined Veridium as CPO, I recognised and appreciated one of the biggest challenges for Enterprise