Video resources

Calling BS on Biometrics

When it comes to biometrics, it either works or it doesn’t. So how do you differentiate between what’s on offer? Here are the key considerations you need to look out for when choosing a biometric [...]

False Accept and Reject

What parameters should be considered when employing biometric verification and what role does this play in authenticating users?

Jargon Buster: Failure to Enrol

Attempts to gain access using a biometric ID in sub-optimal conditions can result in a failure to enrol. With a few simple adjustments, this can be reversed.

Are passwords fundamentally flawed?

Weak, stolen and reused passwords are the cause of more than 80% of breaches. It doesn’t matter how you mix your capitals, numbers and symbols, or even how often you update your password. The [...]

Securing the remote work environment

Thanks to a rapid increase in remote work requirements and policies, home networks are the new front line of corporate security. And while most organisations made a relatively fast transition to [...]

Top trends shaping IAM

From multi-factor authentication and biometrics and the convergence of physical and digital identity access management, hear from industry leaders Andrew Webster, Dr. Geethani Nair and [...]

Daltrey’s Blair Crawford on Ticker TV

Hear from Daltrey’s Blair Crawford as he discusses the death of the password, the newfound ability to have a unified biometric security solution, self-sovereign identity management and the use of [...]

What is a biometric ID?

A biometric ID is a true digital representation of a person’s physical self. Traditionally, access to a system (whether it be a physical building or an online account) requires one of two things. [...]

How does liveness detection work?

Biometrics is without a doubt the most secure form of authentication and infinitely superior to more traditional methods such as passwords and access passes. That said, even biometric [...]

Is MFA enough?

Every organisation should without a doubt be using some form of multi-factor authentication (MFA). It’s a step forward to better security. That said, it should in no way be trusted as the final [...]