(ISC)² Blog

  • Home
  • Archives
  • Subscribe

« July 2010 | Main | September 2010 »

Posts from August 2010

21 August 2010

Why iris scanning can be a biometric

Some great high-resolution shots of human irises. The detail here shows why iris scanning can be used as a distinguishing biometric. Of course, posting high-resolution shots of your biometrics on a Website can be a great way to compromise your biometrics ... Read more →

Posted by Rob Slade on 21 August 2010 at 06:31 PM in Cybersecurity Training, Operations Security, Risk | Permalink | Comments (0)

| |

Search

Categories

  • (ISC)² Chapters (22)
  • (ISC)² Events (152)
  • Center for Cyber Safety and Education (52)
  • Cloud Security (128)
  • Cybersecurity Certifications (373)
  • Cybersecurity Training (305)
  • Cybersecurity Workforce (233)
  • Digital Forensics (28)
  • Ethics (51)
  • Government (112)
  • Insider Risk (55)
  • IT Security (362)
  • Legal (43)
  • Malware (107)
  • Network Security (166)
  • Operations Security (133)
  • Privacy (108)
  • Ransomware (75)
  • Risk (188)
  • Software Development (44)
  • Spotlight (70)
See More