Deepak DuttBehavioral biometrics & FIDO: Laying the foundation for a password-less future?Passwords have been an effective user authentication method for years. They’re familiar, convenient and, too often, easy to crack. To our…Jul 5, 2018Jul 5, 2018
Deepak DuttDecentralized AI and DAppsThe cryptocurrency frenzy that began earlier this year has drawn much attention to blockchain technology and its decentralized structure…Jul 5, 2018Jul 5, 2018
Deepak DuttN-dimensional Authentication Takes Behavioral Biometrics to New LevelsWith mobile fraud on the rise and the cyber world becoming a dangerous place for the uninitiated to wander around in, businesses relying on…May 6, 2017May 6, 2017
Deepak DuttAI and machine learning fighting mobile commerce fraudA recent study from LexisNexis indicates that fraud is a growing problem for online retailers, specifically the ones that offer customers a…Aug 25, 20161Aug 25, 20161
Deepak DuttFFIEC mobile security guidelines, machine intelligence, behavioural analytics and mobile banking…Recently, the FFIEC released expanded security guidelines for mobile banking and financial services — http://bit.ly/2amKWLk. The update is…Jul 23, 2016Jul 23, 2016
Deepak DuttGoogle Showcases behavioral biometrics at IOBehavioral biometrics or behaviometrics is a form of biometric authentication that has shown promise to address the continuous frictionless…Jan 29, 2016Jan 29, 2016
Deepak DuttAdaptive Behavioral Biometrics A Critical Security LayerWe are on the cusp of a global shift to change how we identify the individual. Smart devices including mobile phones, wearables and global…Jan 29, 2016Jan 29, 2016
Deepak DuttCan Adaptive Biometrics Thwart Data Breaches?In a recent study, CNN Money reported that 317 million types of malware were released into cyberspace last year. This translates to nearly…Jan 28, 2016Jan 28, 2016
Deepak DuttWhy adopt behavioral biometrics as part of your multi-modal strategyThe next wave in biometric security is predicted to be the use of multiple biometric authentication systems for human identification…Jan 28, 2016Jan 28, 2016
Deepak DuttHackers get access to Samsung phones via mobile security flawMobile security researchers have discovered a security flaw in Samsung’s default keyboard on its smartphones which can be exploited by…Jan 28, 2016Jan 28, 2016