Some people worry that artificial intelligence will steal their jobs, but machine learning algorithms now generate images of fake fingerprints that match the prints of one in five people on the planet. Other biometric identification systems, such as face and iris recognition, may also be vulnerable. The capability puts the mobile device industry on notice that current biometric authentication systems may not be adequate for securing cell phones and other devices.
It wasn’t too long ago that the Defense Department embarked on a Cybersecurity Discipline Implementation Plan identifying specific tasks that department’s IT personnel must perform to reinforce basic cybersecurity requirements identified in policies, directives and orders across the agency.
The plan, publicly unveiled in March after being amended, segments tasks into four key “lines of effort” to strengthen cybersecurity initiatives:
With a new authentication framework that automatically provides identity, the Czech Republic is proving that electronic security access doesn't have to be compromised for ease of use. The system, known as the Automatic Liberal and User-Centric Electronic Identity, or ALUCID, gives users the best of both worlds.