article thumbnail

Authentic leadership: Building an organization that thrives

CIO Business Intelligence

Leadership styles have traditionally centered their focus on profits, share prices, and productivity, but a new approach increasingly taken up by today’s leaders, known as “authentic leadership,” takes a different spin on the concept. But ultimately, authentic leadership can be viewed as the opposite of traditional leadership in many ways.

article thumbnail

A Bright New Era for User Authentication

HID Global

With SSO authentication, users present their smartphone or smart card to a radio-frequency identification (RFID) reader for a seamless daily access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

In fact, Gartner estimates that by 2026, nearly one-third of enterprises will consider identity verification and authentication solutions unreliable due to AI-generated deepfakes. Facial biometrics presentation attacks take many forms, using deepfake ID documents, “face-swaps,” and even hyper-realistic masks to impersonate someone.

Security 111
article thumbnail

Passkeys: Using FIDO for Secure and Easy Authentication

Phil Windley

Summary: Passkeys, the popular name for FIDO, are not only easy, they offer better protection against phishing than other forms of multi-factor authentication. She's a security expert and focused many of her remarks on the relative security of different multi-factor authentication (MFA) techniques, a topic I cover in my book as well.

article thumbnail

Why ‘deepfake geography’ presents significant risks — and how researchers are detecting it

GeekWire

Techniques such as “location spoofing” and deepfake geography present significant risks for our increasingly connected society. Half of these were authentic images of the three cities. Research like this may help map our path to building a more authentic future. _. and Beijing.

Research 126
article thumbnail

Voice Cloning Conundrum: Navigating Deepfakes in Synthetic Media

SecureWorld News

Voice ID: Security measure under scrutiny The emergence of advanced voice cloning capabilities like OpenAI's Voice Engine calls into question the reliability of voice ID as a secure authentication method. Given these developments, organizations and individuals relying on voice authentication must reconsider their security frameworks.

Media 73
article thumbnail

What is Zero Trust Network Architecture (ZTNA)?

Network World

Everything must be authenticated, authorized, verified and continuously monitored. The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits. To read this article in full, please click here