{"id":14446,"date":"2020-02-12T18:44:15","date_gmt":"2020-02-12T18:44:15","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=14446"},"modified":"2020-02-12T18:44:15","modified_gmt":"2020-02-12T18:44:15","slug":"video-how-secure-is-biometric-authentication-technology","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/video-how-secure-is-biometric-authentication-technology\/","title":{"rendered":"Video: how secure is biometric authentication technology?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Security for important areas and sensitive information has been a continuous struggle for much of human history. With the rise of biometrics however, we may have stumbled onto the best possible security device of all \u2013 ourselves. But just how secure are biometric solutions? Our friends at DW Shift explore this topic in this enlightening video.<\/span><\/p>\n<p><iframe loading=\"lazy\" width=\"618\" height=\"348\" src=\"https:\/\/www.youtube.com\/embed\/ZPG3XQhZVII?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-14446 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='10 charts that explain IoT\u2019s growth'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/10-charts-that-explain-iot-s-growth\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/12\/10-charts-that-explain-iot-s-growth-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11982\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11982'>\n\t\t\t\t10 charts that explain IoT\u2019s growth\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Lenders should use blockchain for identity verification'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/lenders-should-use-blockchain-for-identity-verification\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2017\/12\/Picture1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-7406\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-7406'>\n\t\t\t\tLenders should use blockchain for identity verification\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Video: banking on digital innovation \u2014 APIs'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/video-banking-on-digital-innovation-apis\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/02\/Banking-on-Digital-Innovation-APIs-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-8604\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-8604'>\n\t\t\t\tVideo: banking on digital innovation \u2014 APIs\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Security for important areas and sensitive information has been a continuous struggle for much of human history. With the rise of biometrics however, we may have stumbled onto the best possible security device of all \u2013 ourselves. But just how secure are biometric solutions? Our friends at DW Shift explore this topic in this enlightening &hellip;<\/p>\n","protected":false},"author":5,"featured_media":14447,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,367],"tags":[206],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/14446"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=14446"}],"version-history":[{"count":1,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/14446\/revisions"}],"predecessor-version":[{"id":14448,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/14446\/revisions\/14448"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/14447"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=14446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=14446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=14446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}