
Article • IT security
IAM: Even biometrics can be hacked
Of all the methods used in identity and access management (IAM), biometrics is arguably the oldest: it has been around long before IAM was a “thing”. Humans are naturally optimized for recognizing fellow humans’ faces, voices and other biometric features. However, even biometric recognition between humans is less than perfect, as countless cases of successful impersonators and impostors…