Privacy versus Anonymity – The Price you Pay

Protecting one’s privacy is a concern for everyone.  Yet in today’s environment of mobile devices and 24/7 electronic communication it’s virtually impossible to not feel exposed and somewhat vulnerable to the potential of someone or something compromising your privacy. There was a record 13.1 Million victims of identity theft in 2013 (Up 26.1% from 2012). That’s a new victim every two seconds. Our society requires that we share our personal information with others and we do so every time we …

The Breach Goes On…

Did you hear about the Russian hackers that have stolen over 1 billion passwords and user profiles?  It demonstrates the over-arching driver for biometrics.  Passwords aren’t just dead…they are a liability.  Of course, we have all known this for some time, IBM stated such in 2012; but the gravity of the situation is mindboggling and alarming.  Nothing is secure and that means what we, as a society, have been using to “secure” things is truly useless.  The password did serve’s …

The Apple / IBM Partnership is a Validation of BIO-key’s Vision

The Apple / IBM partnership is a great validation of BIO-key’s vision and ambidextrous device plus cloud approach. Why? Because the Apple-IBM partnership is all about the tighter integration of IBM data analytic services and apps with Apple’s devices, design capabilities, and most importantly, cross-device continuity for business services.   The new Apple Swift development platform seamlessly moves a user between mobile and a desktop or tablet, blurring of the lines between device, thus I can start a task on …

How New York’s I-STOP Law Will Forever Change Physician Behavior across the USA

How New York’s I-STOP Law Will Forever Change Physician Behavior across the USA To understand fully what we mean by this title, let us explore what New York State’s I-STOP law is. This will come as no news to our New York colleagues, who are hurriedly and meticulously looking for ways to stay in compliance by the end of March next year. What is I-STOP? The Internet System for Tracking Over-Prescribing was passed by the New York State Legislature in …

Does Apple or FIDO care about a Trusted Source?

How does Apple or FIDO know you are the person that is authorized to access that phone? Or, how does the 3rd party applications (apps) that are accessed through the phone know you are the person authorized to have access? The fingerprint sensor? Well, what if that mobile fingerprint authentication capability isn’t very accurate? What if it’s spoofable because the technology doesn’t use enough data to authenticate the user with a high degree of assurance?  Given both Apple and Samsung’s …