Select Page
Are We Ready to Combat Cyber-Terrorism?

Are We Ready to Combat Cyber-Terrorism?

“Russia and China Know More About Hillary Clinton’s Email Than the U.S. Senate” By: Mark Virnig | 8.11.15 This is what I heard from the GOP Presidential debate last week. To minimize further political debate, I am omitting the speaker of the quote. The statement...
Hack of the Century

Hack of the Century

“Hack of the Century” – How Biometrics Can Help Bridge the Last Mile of IT Security By: Violet Le 8.3.2015 While I was making my connections last week at the San Diego airport, a striking front cover title of the Fortune magazine caught my attention. It read...
Did you really leave your personal health record in the cab?

Did you really leave your personal health record in the cab?

In the 1990’s, who would have thought that by 2015 most of your sensitive health records might be stored on the mobile phone in your pocket.  If you thought you were afraid of leaving your smartphone behind in the cab before, imagine how much you store on your mobile...
If Identity Fraud Occurs Every 2 Seconds, How Do You Stop It?

If Identity Fraud Occurs Every 2 Seconds, How Do You Stop It?

By Jeff Harris, 12/16/2014 In October 2014, President Obama signed a new Executive Order requiring all agencies that provide online access to personal data to use multiple methods of authentication, including identity proofing. He gave them an 18-month deadline for...