(ISC)² Blog

  • Home
  • Archives
  • Subscribe

« July 2010 | Main | September 2010 »

Posts from August 2010

21 August 2010

Why iris scanning can be a biometric

Some great high-resolution shots of human irises. The detail here shows why iris scanning can be used as a distinguishing biometric. Of course, posting high-resolution shots of your biometrics on a Website can be a great way to compromise your biometrics ... Read more →

Posted by Rob Slade on 21 August 2010 at 06:31 PM in Cybersecurity Training, Operations Security, Risk | Permalink | Comments (0)

| |

Search

Categories

  • (ISC)² Chapters (20)
  • (ISC)² Events (124)
  • Center for Cyber Safety and Education (50)
  • Cloud Security (119)
  • Cybersecurity Certifications (344)
  • Cybersecurity Training (293)
  • Cybersecurity Workforce (183)
  • Digital Forensics (27)
  • Ethics (49)
  • Government (94)
  • Insider Risk (54)
  • IT Security (352)
  • Legal (41)
  • Malware (95)
  • Network Security (157)
  • Operations Security (125)
  • Privacy (96)
  • Ransomware (49)
  • Risk (162)
  • Software Development (41)
  • Spotlight (65)
See More