article thumbnail

Security Industry Association and International Biometrics + Identity Association Oppose Adding Extraneous Prohibitions on TSA Use of Facial Biometrics in Potential FAA Measure

Security Industry Association

of the House Committee on Transportation and Infrastructure, SIA and IBIA encouraged Congress to reject such a proposal, which would force the TSA to abandon its highly successful use of facial biometrics to verify required traveler documents at security checkpoints, which has improved safety, security and travel experiences for millions of U.S.

Travel 105
article thumbnail

Why Encryption is Key to Cost Efficient GDPR Compliance

Pure Storage

In general, there are three ways that businesses can encrypt their data: At the application layer In flight At rest Encryption at the Application Layer Encryption at the application layer is the least effective, both in terms of allocation of resources and business efficiency.

Banking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mobile Credentials: A Seamless and Sustainable Approach to Access

Security Industry Association

While digital wallets have been around for payment transactions for some time, they are now holding medical prescriptions, travel documents, driver’s licenses, ID cards, insurance information and more. Companies can achieve the greatest implementation success by allowing mobile access use for every application in their environment.

article thumbnail

Improving Visitor Management With Lighting Technologies

Security Industry Association

Lighting for Increased Detection Accuracy To increase detection accuracy for facial and iris recognition applications, security professionals can install external IR and white light illuminators. In fact, according to Cognitive Market Research, the global contactless biometric technology market size was estimated to be $48.2

article thumbnail

Data Privacy Week 2024: The Definitive Roundup of Expert Quotes

Solutions Review

Additionally, posting on social media and reacting to social media posts should be done with no sharing of personal information including sensitive information like home address, travel, family plans and related information. Use multi-factor authentication, API keys, and granular access controls.

article thumbnail

Security Industry Association Announces Winners for the 2022 Women in Biometrics Awards

Security Industry Association

Prior to Dignari, Alexa led various aspects of programs including TSA Registered Traveler, the EU’s Entry-Exit Feasibility Study, the Port of Los Angeles Transportation Worker Identification Credential (TWIC) and the CBP Western Hemisphere Travel Initiative. About AVISIAN.

article thumbnail

Backup and Disaster Recovery Strategy in the Era of Remote Work

Solutions Review

For compliance, performance, and security reasons, for instance, many businesses may wish to keep their core data storage on-premises but reap the benefits of the public cloud for other applications. Employees used to travel to an office and have their laptops and other devices backed up there, but that’s no longer true.