searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

facial recognition

Get our top stories in your inbox

Intel RealSense ID: Facial authentication designed with privacy as a priority

January 8, 2021

Intel introduced Intel RealSense ID, an on-device solution that combines an active depth sensor with a specialized neural network designed to deliver secure, accurate and …

Face recognition software making progress at recognizing masked faces

December 3, 2020

A study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress at recognizing …

Facing gender bias in facial recognition technology

August 27, 2020

In the 1960s, Woodrow W. Bledsoe created a secret program that manually identified points on a person’s face and compared the distances between these coordinates with other …

How well do face recognition algorithms identify people wearing masks?

July 28, 2020

Now that so many of us are covering our faces to help reduce the spread of COVID-19, how well do face recognition algorithms identify people wearing masks? The answer, …

New technique keeps your online photos safe from facial recognition algorithms

July 3, 2020

In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of …

Biometric device shipments revenue to drop by $2 billion

May 11, 2020

The pandemic is expected to cause a significant pushback on biometric device shipments, creating a major revenue drop of $2 billion over the course of 2020, according to ABI …

How to balance privacy concerns around facial recognition technology

April 3, 2020

There has been global uproar regarding facial recognition technology and whether and when it’s ethically sound to use it. Its use without citizens’ consent could have …

Unregulated use of facial recognition tech threatens people’s privacy, civil rights

October 19, 2016

Facial recognition tech is a boon to law enforcement, but without strict regulation and safeguards, it poses considerable risks to the privacy, civil liberties, and civil …

FindFace app heralds the end of public anonymity and privacy?

May 18, 2016

While Facebook battles in court to be allowed to use its facial recognition tech (which it already gave up using in Europe), another company – whose facial recognition …

architecture

Why enterprises need rugged devices with integrated endpoint management systems

  • Five factors driving investment in IDV
  • 2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?
Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations

What's new

hand

Attackers disrupting COVID-19 efforts and critical supply chains

identity

Five factors driving investment in IDV

architecture

Why enterprises need rugged devices with integrated endpoint management systems

businessman

C-level executives driving the adoption of MACH across their organizations

Don't miss

architecture

Why enterprises need rugged devices with integrated endpoint management systems

identity

Five factors driving investment in IDV

tracking

CNAME-based tracking increasingly used to bypass browsers’ anti-tracking defenses

2021 will be the year of hybrid working: How can CTOs keep staff secure and productive?

template

Third-party risk management programs still largely a checkbox exercise

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps
  • How do I select a DRM solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise