For the past decade, we’ve been assured that biometric security is the future, and that soon we’ll be able to do away with traditional forms of identification and authentication in favour of using our faces, fingerprints and even voices.
However, while biometric technology is certainly more common than it was in 2010, the promised revolution hasn’t quite materialised. We still have to rely on PINs and passwords for many of our transactions (both financial and otherwise) and biometric authentication is still largely limited to mobile devices. So what’s next for the technology? In this episode, we talk to Steven Furnell, senior IEEE member and professor of cyber security at the University of Nottingham, about where biometric security is going.
Footnotes
- What are biometrics?
- Only skin deep: The state of biometric security
- Petition urges EU regulators to ban biometric mass surveillance
- Hacked for life: Why you should be terrified by biometric technology
- TikTok settles for $92m after being accused of harvesting biometric data
- Dreaming of a world without passwords
- GitHub now supports security keys in a move away from passwords
- Google’s about to push everyone into two-factor authentication
- The IT Pro Podcast: How hackers steal your password
- If not passwords then what?
- The pros and cons of facial recognition technology
- How can facial recognition be made safer?
- Facial recognition tech used by UK police "breaches privacy"
- The IT Pro Podcast: The psychology of security
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
- Subscribe to The IT Pro Podcast on Google Podcasts
- Subscribe to The IT Pro Podcast on Spotify
- Subscribe to the IT Pro newsletter
- Subscribe to IT Pro 20/20
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
What is Microsoft Maia?Explainer Microsoft's in-house chip is planned to a core aspect of Microsoft Copilot and future Azure AI offerings
-
If Satya Nadella wants us to take AI seriously, let’s forget about mass adoption and start with a return on investment for those already using itOpinion If Satya Nadella wants us to take AI seriously, let's start with ROI for businesses
-
Are AI cyber threats overhyped?ITPro Podcast As cyber teams turn to the threats posed by AI, rising attacks by state-sponsored groups and ransomware gangs remain the biggest threat
-
The future of threat detectionITPro Podcast To fight sophisticated threats, cybersecurity teams will need to unify data like never before
-
November rundown: CrowdStrike's insider threatITPro Podcast As CrowdStrike grappled with a malicious employee, Cloudflare suffered a major outage
-
Getting a grip on digital identityITPro Podcast As AI agent adoption explodes, security leaders will need better identity controls than ever before
-
Mobile app security is a huge blind spot for developer teams – 93% are confident their applications are secure, but 62% reported breaches last yearNews Organizations are overconfident about their mobile app security practices, according to new research, and it’s putting enterprises and consumers alike at risk.
-
Let’s talk about digital sovereigntyITPro podcast In the age of AI and cloud, where data resides is a key consideration
-
Blackpoint Cyber and NinjaOne partner to bolster MSP cybersecurityNews The collaboration combines Blackpoint Cyber’s MDR expertise with NinjaOne’s automated endpoint management platform
-
Can cyber group takedowns last?ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
