Remove Authentication Remove Examples Remove Information Security
article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

In information technology, biometrics usually refers to technologies for measuring and analyzing human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns, and hand measurements, especially for authentication purposes. In a computing context, the term security implies cybersecurity.

article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

For example, a body-worn sensor for a child with diabetes would enable his or her caretakers to monitor for blood sugar, location, or other issues. For example, data off airline engines is collected to predict – and prevent – anomalies in the engine throughout the flight.

Security 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Making Banking a More Effortless Experience

CIO Business Intelligence

For example, is the person on the phone frustrated, using angry words? An application can now listen and capture words during a conversation to help create a higher level of awareness of the customer’s current needs, while also pulling information from past interactions with the customer.

Banking 131
article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In recent months, you may have noticed an uptick in two-factor and multi-factor authentication prompts, which are being used to verify consumer and business accounts. Implementing multi-factor authentication. For example, physical security keys can help halt phishing attacks when multi-factor authentication is available.

article thumbnail

‘The week has literally exploded’: Tech security startups grapple with SolarWinds fallout

GeekWire

Cybersecurity & Infrastructure Security Agency. The scale and sophistication of the attack are “amazing,” said Michael Hamilton, co-founder and chief information security officer of Seattle startup CI Security. “We probably won’t know the full extent of damage for a while, unfortunately.

Security 144
article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

His research activities have involved the design of a token-passing ring local area network, networking of personal computers, the Kerberos single-login authentication system, and the design of the electronic library of the future. Irvine is a Distinguished Professor of Computer Science at the Naval Postgraduate School.

Security 150
article thumbnail

3 ways to deter phishing attacks in 2023

CIO Business Intelligence

Rather, they target enterprise employees who can be duped into revealing information that’s much more sensitive, on a much larger scale. “An An example might be a bank – we don’t want to target its customers, we think that’s dumb and slow, we want to target the bank itself,” said Mike Connory , CEO at Security In Depth.

Training 140