Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

AVISIAN Podcasts

show episodes
 
The weekly podcast covers relevant issues and breaking news from AVISIAN. AVISIAN Publishing produces a suite of online and print publications focused on identity, credentialing and security markets. The company’s thirteen online titles cover distinct technology and application verticals and the print magazine, Regarding ID (Re:ID), is a global leader in this rapidly growing technology sector. Collectively, more than 30,000 subscribers and one million annual web visitors get their ID technol ...
  continue reading
 
Loading …
show series
 
In the third episode of a four-part podcast series, SecureIDNews explores the current landscape of state pilots around mobile driver’s licenses. The mobile IDs are rolling out in a series of innovative trials and many additional state legislatures are instructing their DMVs to prepare. Hear about the ‘state of the states’ in this episode of our pod…
  continue reading
 
In the second episode of a four-part podcast series, SecureIDNews investigates both the privacy concerns and the opportunities for privacy enhancement that arise when traditional ID cards and credentials migrate to mobile devices. Mobile ID is poised to play a role in credentials including driver’s licenses, sporting licenses, professional licenses…
  continue reading
 
The name Stephanie Schuckers is almost synonymous with liveness detection in biometrics. But it doesn’t end there. Dr. Schuckers is also a professor at Clarkson University, director of the Center for ID Technology Research, founder of a biometric startup and mentor to an ongoing crop of new biometric scientists. Last year, the startup she founded w…
  continue reading
 
Biometrics was neither a household term nor a ‘handset technology’ when Frances Zelazny began working with facial recognition two decades ago. During her career she has helped shape the use of biometrics for security, identity and now for payment applications. Throughout, she has advocated for responsible use guidelines and practices, something tha…
  continue reading
 
Liane Moriyama retired last summer as Administrator of the Hawaii Criminal Justice Data Center and she is honored for her innovative career as a 2017 winner of the Women in Biometrics awards. She was instrumental in bringing the first AFIS to Hawaii and helping other states to follow suit. But it is her crossover between the use of biometrics for l…
  continue reading
 
Creator of the FBI's Biometric Center for Excellence and Deputy Assistant Director of the Information Services Branch of CJIS, Kimberly Del Greco is a go to biometrics lead for the Federal government. She was instrumental in the Next Generation Identification Program that redefined algorithms and modalities to increase the agency's biometric match …
  continue reading
 
In this first episode of a four-part podcast series, SecureIDNews explores the use of IDs and credentials on mobile devices. Agencies and issuers are rapidly working to augment their physical ID cards and documents with mobile versions, expanding both security and functionality. Learn how and why from key industry leaders during this kick-off to ou…
  continue reading
 
“I came into this field not as an expert in biometrics. My background is in marketing and events,” says Isabelle Moeller, chief executive of the Biometrics Institute and a 2017 Women In Biometrics winner. Moeller joined the fledgling Biometrics Institute in 2002 to help grow the organization’s membership. The institute shares information and provid…
  continue reading
 
In this podcast, SIA’s CEO Don Erickson and SecureIDNews Publisher Chris Corum talk about the 2017 Women in Biometrics awards, highlighting the program’s growth over the years and what it has come to mean to the international biometrics and security community. Nominations are open until Sept. 29 so don’t delay.…
  continue reading
 
In this podcast episode, SecureIDNews' Gina Jordan talks with Colin Wallis about Kantara's three pilots recently funded by the Department of Homeland Security. Each pilot focuses on a unique aspect of digital identity – such as addressing first responder authentication and the use of derived credentials from PIV cards. The pilot recipients include …
  continue reading
 
The eventual demise of the plastic card seems inevitable to many working with government issued credentials, thanks to the security and convenience of mobile as an ID. But will mobile be a replacement or a complement? In this podcast, we explore this question and preview a webinar that delves deep into the topic of co-existence.…
  continue reading
 
“We don’t want to confuse existing customers or future customers that Cogent’s been lost or disappeared,” says Gemalto’s Neville Pattinson, in this episode of the re:ID Podcast series. “It’s now an additional part of the Gemalto portfolio. So we’ll continue to brand it in terms of Cogent from a biometrics side.” In the podcast, you’ll learn just wh…
  continue reading
 
In this podcast, part 2 of our conversation with Andre Boysen of SecureKey, we explore the specifics of how ledger-based cryptographic systems like blockchain can empower digital identity. Learn how he envisions strong identity across the Internet without risking personal data, breaches or privacy.By AVISIAN
  continue reading
 
In this podcast, Andre Boysen of SecureKey talks about his company's work with the Digital ID and Authentication Council of Canada (DIACC) and IBM to develop a digital identity network using blockchain technology. He believes the world must transition from user name and password based authentication to secure methods that put the user in control of…
  continue reading
 
The industry organization that for more than two decades promoted the use of smart cards is expanding its mission to include other secure technologies. The Smart Card Alliance recently became the Secure Technology Alliance to reflect this new focus. The group's longtime executive director, Randy Vanderhoof, talks about the organization's plans and …
  continue reading
 
The biometric authentication system of the future may include passwords sent through the human body. Researchers at the University of Washington have come up with a uniquely secure way to transmit data. They say it can be done using low-frequency transmissions generated by fingerprint sensors and touchpads found on devices we use everyday. Vikram I…
  continue reading
 
The September 11, 2001 terrorist attacks sent Dr. Nicole Spaun on a new career path. “The hijackers went through airports. They had surveillance and they couldn’t match up the faces because the automated systems didn’t exist at the time, and they didn’t have enough trained people to look at all the imagery,” Spaun says. At that time Spaun had a bac…
  continue reading
 
Automobiles are vulnerable to being hacked these days much like computers. It’s becoming more common for modern cars to come equipped with on board computers and other electronic systems that connect to the Internet. But often forgotten in this equation is securing these systems with necessary authentication and security systems. Security researche…
  continue reading
 
In the future, your access to secure areas may depend not on a password or fingerprint – but your brain. Researchers at Binghamton University in New York have developed a way to verify a person by measuring the brain’s response to certain stimuli. The team is reporting up to 100% accuracy with the technology, known as Brainprint. A problem for most…
  continue reading
 
EveryKey, a device that can enable access to mobile devices, laptops and even a car or home, zoomed to 676% of its crowd funding target on IndieGogo earlier this month. The product also has a recognized name backing it, John McAfee, the guy who founded a wildly successful anti-virus company and is now running for U.S. president as a Libertarian Par…
  continue reading
 
Many bold claims were made about facial recognition technology in the wake of the September 11, 2001 terrorist attacks in the U.S. Vendors said facial recognition could spot wanted criminals in a crowd and perhaps stop terrorists from entering the country. The reality was quite different as it turns out that the technology works best with cooperati…
  continue reading
 
Innovations in biometric authentication are slowly moving consumers away from passwords for online checkouts. These advancements include the MasterCard Identity Check suite of solutions that prove a consumer’s identity while simplifying online transactions. A MasterCard global survey of about 10,000 consumers found that 53% of frustrated shoppers f…
  continue reading
 
NIST, the National Cybersecurity Center of Excellence and the NSTIC National Program Office are working together on a new project focused on protecting privacy and security when reusing credentials online. The trio is accepting comments on the project, which will examine how commercially available privacy-enhancing technologies may be integrated in…
  continue reading
 
Galois, a Portland-based company that focuses on cyber security primarily for the U.S. government, is the final winner of the fourth round of NSTIC pilots. Galois and its partners will build a tool that relies on biometric authentication to enable the storing and sharing of private information online. They also intend to develop transit ticketing o…
  continue reading
 
The latest round of NSTIC pilot awards announced by the National Institute of Standards and Technology (NIST) includes a two-time winner. MorphoTrust USA received a grant last year to pilot the creation of an electronic ID in North Carolina for accessing online services with the same security and identity authentication as in-person transactions. W…
  continue reading
 
The National Institute of Standards and Technology has announced a fourth round of grant awards in support of the National Strategy for Trusted Identities in Cyberspace (NSTIC). One of the winners is HealthIDx, which is developing a privacy-enhancing technology that protects patients’ identity and information. This project will pilot a “triple blin…
  continue reading
 
World leaders in the identity management industry will be in Washington D.C. September 28 and 29 for the 7th edition of the eID Conference. Some 300 delegates are expected for panel discussions and keynotes speeches about the global eID infrastructure, driver license technology and the digitalization of citizen ID documents. “It’s an opportunity fo…
  continue reading
 
World experts in terrorism and border security will be in Washington D.C. in September to discuss threats and solutions around the global movement of terrorists. The gathering is hosted by BORDERPOL, a nonprofit organization that supports border agencies worldwide. The group will examine one of the biggest culprits in successful terrorist travel: l…
  continue reading
 
It’s been nearly three years since the first grant award winners were chosen for the National Strategy for Trusted Identifies in Cyberspace (NSTIC) pilot projects. Three rounds of pilot winners have been selected each year since 2012, and a fourth round will be announced in the coming weeks. We check in with all of the previous winners for the fall…
  continue reading
 
Evgeny Chereshnev, the global head of social media for IT security company Kaspersky Lab, was trying to figure out how individual’s can have better control over their personal information and decided on an experiment. It started with him implanting an NFC chip in his hand and trading in his work badge and he’s hoping it will to continue with more a…
  continue reading
 
GlobalPlatform develops specifications for the interoperable deployment and management of multiple applications on secure chip technology. Those specifications include a focus on the Trusted Execution Environment (TEE). The association has announced the launch of a TEE Security Evaluation Secretariat. The move is designed to accelerate the deployme…
  continue reading
 
Computers can’t replace humans when it comes to tattoo recognition. That’s a key finding from the Tattoo Recognition Technology Challenge Workshop hosted by the National Institute of Standards and Technology. But computer algorithms are getting better, and new standards are being considered for the collection of tattoos. While tattoos are a seconda…
  continue reading
 
The dark world of the web is exposed in a case study by CSID called Hacking the Hackers. The ID theft protection firm conducted an experiment this spring that shows why it's bad practice to reuse passwords. CSID created a fake company, complete with employees who had social media accounts and credit cards, and exposed some of the company's sensitiv…
  continue reading
 
Some private school students and staff in St. Louis are making use of biometrics in their day-to-day comings and goings. A facial recognition system has been installed at St. Mary's High School. The cameras green light the faces recognized by the software system - or reject them if they've been labeled a threat. School president Mike England spoke …
  continue reading
 
Many people don’t have easy access to the Internet, yet state governments and others are increasingly moving services online. How do the states ensure that these people have access to these services and are able to enroll an identity? Regarding ID's Gina Jordan posed these questions and more to ABI Research's Phil Sealy.…
  continue reading
 
The UN Refugee Agency has begun deploying a Biometrics Identity Management System (BIMS) after a successful pilot. The goal is to enable displaced travelers to move between camps without having to be enrolled at each new stop. The system is global and will eventually allow biometric information to be communicated between camps. The agency’s Sam Jef…
  continue reading
 
A bill passed by the Virginia General Assembly and is awaiting the governor’s signature will go a long way toward enabling Virginians to dump most of their passwords in favor of a single digital identity credential. The proposal would establish uniform standards for strengthening and authenticating digital identities. Supporters say developing thes…
  continue reading
 
Insurance and banking provider USAA is rolling out biometric authentication on its mobile app. The company says face and voice recognition capability should be available nationwide to all of its 10.6 million customers in the coming weeks. USAA caters to members of the military and their families. The biometric login can only be used statewide on sm…
  continue reading
 
Iowa is America’s first state to take steps toward implementing a digital driver’s license. The Iowa Department of Transportation has been talking about the possibility with identity provider MorphoTrust USA for about a year. The concept is being readied for a pilot phase, and planners are looking at the potential of a public launch in 2016. Questi…
  continue reading
 
Body recognition biometrics may be the most accurate form of authentication, based on theoretical research conducted at the University of Adelaide. PhD student Teghan Lucas – working with supervisors Maciej Henneberg and Jaliya Kumaratilake – used an old online database of body measurements from 4,000 U.S. military personnel to come up with this sy…
  continue reading
 
The Minutiae Interoperability Exchange Test (MINEX) is nearly a decade old, born out of Homeland Security Presidential Directive-12, which calls for interoperable credentials for federal employees. The National Institute of Standards and Technology operates the test, which measures the performance of fingerprint matching software based on the stand…
  continue reading
 
Health care systems have been slow to embrace biometric identification technology for patients, but business is growing. Hospitals are starting to notice the potential value of using biometrics for patient identification: less fraud, fewer duplicate records, shorter wait times. Health care companies that have taken the biometric plunge using M2SYS …
  continue reading
 
Microsoft is seizing the opportunity to hook up with Internet-connected devices and turning to the cloud to provide enterprises with more identity authentication options, while also helping organizations embrace a bring-your–own-device (BYOD) policy. Alex Simons, director of program management for Microsoft’s Azure Active Directory, fills Regarding…
  continue reading
 
Barely two-years-old, Confyrm is making a big impact with a $2.4 million two years pilot project that will demonstrate ways to minimize loss when criminals create fake accounts or take over online accounts. A key barrier to federated identity — where an identity provider “vouches” for an individual at other sites — is the concern that accounts used…
  continue reading
 
MorphoTrust is among the latest round of pilot winners for the National Strategy for Trusted Identities in Cyberspace. The company is working with North Carolina and about half a dozen partners to create an electronic ID for accessing online services. Their goal is that the eID will provide the ability to authenticate identity with the same securit…
  continue reading
 
It’s been two years since Internet2 was awarded a $1.8 million grant from the National Strategy for Trusted Identities in Cyberspace. Among other things, the money is being used to encourage the use of multi-factor authentication among higher education institutions. As more schools roll out multi-factor authentication, dozens have joined a “cohorti…
  continue reading
 
The FBI started rolling out the Next-Generation Identification system in 2010, with new increments coming about every 18 months, and completion expected in about 2020. In about a year, the FBI will start operating out of the $164million Biometrics Technology Center in Clarksburg, W.Va. Stephen Morris, assistant director of the FBI’s Criminal Justic…
  continue reading
 
It’s estimated that’s security breaches cost companies $100 billion a year yet the IT security market as a whole is worth $50 billion. There’s a disconnect between those two numbers but Patrick Harding, CTO at Ping Identity, posits that by using different identity management technologies enterprise security can save money. By using single sign-on s…
  continue reading
 
When it comers to ways to improve online authentication, the discussion quickly turns to two-factor. And while two-authentication is an improvement over user names and passwords it can still be hacked. One of the latest attacks is a variation on a man-in-the-middle attacks that’s being used in Europe. Regarding ID’s Gina Jordan spoke with Tom Kelle…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play