Cisco NGO partner Simprints to advance ethical, inclusive AI for face recognition biometrics

Cisco NGO partner Simprints to advance ethical, inclusive AI for face recognition biometrics

In 2021, Cisco published a blog post on Simprints’ touchless, facial biometric ID technology. See how Simprints is now working to open-source this solution and assemble inclusive and ethical AI training datasets with support from Cisco’s Global Impact Grant program. The case for biometric identification Safe, reliable, and portable forms of ID are necessary to access critical services like healthcare and humanitarian aid. But an estimated 850 million people globally lack formal ID, making it…

Read More

Make Change Your Password Day an impetus to boost overall cybersecurity

Make Change Your Password Day an impetus to boost overall cybersecurity

Make Change Your Password Day an impetus to boost overall cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

9 US universities awarded cybersecurity career development grants

9 US universities awarded cybersecurity career development grants

9 US universities awarded cybersecurity career development grants | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The new workplace imperative: Authenticate anywhere, access everywhere

The new workplace imperative: Authenticate anywhere, access everywhere

The new workplace imperative: Authenticate anywhere, access everywhere | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The future of airport security technology

The future of airport security technology

The future of airport security technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Risk mitigation tactics for modern distribution centers

Risk mitigation tactics for modern distribution centers

Risk mitigation tactics for modern distribution centers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Biometrics as a foundation of zero trust: How do we get there?

Biometrics as a foundation of zero trust: How do we get there?

Biometrics as a foundation of zero trust: How do we get there? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Ethiopian government introduces digital biometric IDs

Ethiopian government introduces digital biometric IDs

Ethiopian government introduces digital biometric IDs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

The pros and cons of biometric access control in university applications

The pros and cons of biometric access control in university applications

<!– The pros and cons of biometric access control in university applications | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Biometrics: Flexible and effective across different industries

Biometrics: Flexible and effective across different industries

<!– Biometrics: Flexible and effective across different industries | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2