Iris Pattern Recognition – A Closer Look at How it is Used In Cybersecurity

Finjan TeamBlog, Cybersecurity

Finjan Iris Pattern Recognition   A Closer Look at How it is Used In Cybersecurity

The routine inclusion of a fingerprint scanner on certain popular brands of smartphone points to the fact that biometric security techniques are becoming an increasingly common aspect of our daily lives. Unique personal identifiers based on physical characteristics or behavior are in many ways a more reliable – and certainly a more convenient – method of authentication and validation than … Read More

Facial Recognition Technology

Finjan TeamBlog, Cybersecurity

Finjan Facial Recognition Technology

For some years now, biometric measures have been touted as “The Next Big Thing” in cyber-security, with the potential to do away with the hassle of remembering, storing, and periodically changing passwords or access codes. Though validation procedures using unique physical and behavioral traits have been adopted as part of two or multi-factor authentication processes, these technologies have yet to … Read More

The Use of Biometrics in the Mobile Space

Finjan TeamBlog, Cybersecurity

Finjan The Use of Biometrics in the Mobile Space

With data breaches, fraud, and identity theft so often in the news, network and Internet users at all levels are anxious for ways to safeguard their information and protect themselves from malicious intrusions and criminal acts. But passwords, PINs, security codes and encryption keys are notoriously difficult to remember and use – especially when so many people transact their affairs … Read More

The Future of Biometric Authentication

Finjan TeamBlog, Cybersecurity

Finjan The Future of Biometric Authentication

Biometric Authentication Law enforcement agencies have been using fingerprint records to identify individuals for over 100 years. With developments in physical biology, behavioural science, and technology, the idea of using a person’s physical characteristics or behaviour as a basis for access control, identification and security continues to gain in popularity. The global reach of the smartphone (many with the imaging and … Read More