Identity Management / Biometrics


Legit and Legal

Background screening has grown in importance as employers seek to confirm the credentials of potential new hires. It is equally important for employers to verify whether job candidates are legally eligible to work in this country.

Investing the Secure Way

At the 2007 Financial Symposium held in Europe, Sir Chris Fox, former president of the Association of Chief Police Officers in the United Kingdom, focused his remarks on the strategic and corporate responsibility of partnerships for security in the finance and banking sector. His comments of yesteryear couldn’t have been more appropriate for today’s banking and financial institution leadership.

Austrian Fire Service College Installs Kaba Access Control System

The training college for firefighters in the Austrian town of Tulln now has a modern security system. Combined with wireless linking via card (CardLink) and LEGIC contactless technology, the Kaba exos access control system allows simple cost-effective management, quick expandability and administrative flexibility.

SCM Microsystems, Hirsch Electronics Announce Merger

SCM Microsystems and Hirsch Electronics Corp. recently announced the companies have entered into a definitive agreement to merge.

Morocco Issues More Than 1 Million Biometric, Contactless ID Cards

Just seven months after the production of the first document, the Kingdom of Morocco’s national security service has already issued its millionth biometric, contactless ID cards.

Credit Union Uses Biometric Access Control System

City Credit Union, headquartered in Dallas, recently purchased and implemented US Biometrics’ AccessQ system for controlling physical access to entrances with fingerprint biometrics.

Biometric Facial Recognition Technology Helps Track Down Crime Suspect

Thanks to a biometric facial recognition system, the Pierce County Sheriff’s Department in Washington State recently made an arrest that helped break up a local identity theft ring. With the MorphoFace Investigate system from Sagem Morpho, the sheriff’s office identified the suspect by comparing a photo taken by an ATM to the department’s database of more than 350,000 mugshots.

Survey: U.S. Consumers Trust Biometric Technology For Data Protection

A recent survey conducted by Unisys finds a majority of Americans are comfortable using common biometric technologies for authentication.



Researchers Find Steps To Improve Facial Recognition Systems At Border Entry Points

Facial recognition systems perform some very challenging tasks such as checking an individual’s photo against a database of known or suspected criminals. The task can become nearly impossible when the systems acquire poor facial images -- a situation that occurs all too often in real-world environments.

Banking on Megapixel

Emprise Bank is a name well known in Kansas for leadership, integrity and service to its customers and to the community. Headquartered in Wichita, the privately owned bank has more than 40 locations in 20 communities across the state. Its culture of commitment and customer service is strongly instilled in its nearly 500 staff members.

HID Global Honored For Support Of Connecticut Career Choice Program

HID Global recently announced that its Connecticut manufacturing facility is to be honored by Lt. Gov. Michael Fedele, in recognition of the company’s efforts and continued support of the Connecticut Career Choice program.

One Size Fits All

Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.

Biometrics Penetrating Consumer Markets, According To Research

Long the domain of government and law enforcement agencies, biometric systems are increasingly moving into the market for personal data management and security, according to information from ABI Research.

AMAG Technology Helps Guide Department Of Defense To FIPS 201 Compliance

The Department of Defense issues Common Access Cards to more than 4 million military, retried military and contractors throughout the world. DoD was tasked with complying with the Federal Information Processing Standards Publication 201. FIPS 201 is a federal government standard that specifies Personal Identity Verification requirements for Federal employees and contractors.

California Hospital Uses Biometrics To Protect Patient Privacy, Safeguard Medical Records

The ValleyCare Health System in Pleasanton, Calif. is one of the first hospitals in the United States to use a palm vein authentication technology as part of its patient registration and identification system.

Panel: Airport Security Program Places New Emphasis On Stronger Identity Verification

An airport security program under way at Baltimore's Thurgood Marshall International Airport “has put a new emphasis on the need for greater use in airports of stronger identity verification technology,” according to Paul Onorato, president of the Coalition of Airline Pilots Associations.

Smart Card Alliance Creates Professional Certification Program

The Smart Card Alliance recently announced it has created the Leadership, Education and Advancement Program (LEAP) for individuals interested in continuously improving their knowledge and professional proficiency in the smart card industry.

TSA Approves Biometric Readers For TWIC Pilot

The Transportation Security Administration has approved four biometric readers from Sagem Morpho for deployment in critical pilot tests of the Transportation Worker Identification Credential program at major U.S. ports including Los Angeles, New York and Long Beach, Calif.

HID Acquires Nectar Smart Card .NET Technology

HID Global recently announced that it has acquired Nectar smart card .NET technology, based on Microsoft .NET, from StepNexus and Hive Minded.

Research: E-Passports, ID Cards Drive Up Demand For RFID Hardware

A recent report from Research and Markets says that even in the government sector, initiatives such as e-passports and RFID enabled ID cards are expected to drive demand for RFID hardware.

Featured

  • Facing Facts for Facilities

    Despite the proliferation of constantly evolving security solutions, there remains a troubling trend among many facility operators who often neglect the most important security assets within their organization. Keys and shared devices like radios, laptops and tablets are crucial to successful operations, yet many operators are managing them haphazardly through outdated storage systems like pegboards and notebooks. Read Now

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

  • TSA Begins REAL ID Full Enforcement Today

    Today, the Transportation Security Administration (TSA) announced the imminent implementation of its REAL ID enforcement measures at TSA checkpoints nationwide. Read Now

  • Body-Worn Cameras on the Rise

    On the evening of Oct. 29, 2024, the owner of 300 Guard based in Houston, was shot while on duty at a convenience store. He returned fire. He was wearing a plated vest and thankfully recovered in the hospital. Read Now

  • Brazil Port Enhances Surveillance and Supports Wildlife Conservation with Sustainable Technology

    Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritizing sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities