Should Facial Recognition be Used to Identify Individuals with Coronavirus?

Security Magazine | March 20, 2020

Facial recognition companies are seeing opportunity in their services with the Coronavirus in identifying individuals without the risk of close contact, according to OneZero. DERMALOG, a biometrics company that makes fingerprint, iris, and facial recognition hardware, has adapted its technology to determine temperature and is pitching the update as a safety feature, says the news report. Telpo is launching temperature-sensing terminals with facial recognition, which allegedly work even if a person is wearing a face mask. “In the face of this outbreak, we have developed a solution for noncontact body temperature measurement plus face recognition in order to meet the rapid need to diagnose the patient and isolate and control the virus in time,” Crystal Chu, a platform marketing specialist at Telpo, wrote to OneZero in an email.

Spotlight

Cloud Security Compliance is the process and act of complying with the regulatory standards for using the cloud, according to industry guidelines and associated laws. Non-compliance can lead to financial and reputational damage, business interruption and legal challenges.


Other News
PLATFORM SECURITY,SOFTWARE SECURITY

Stellar Cyber Integrates with Netskope to Deliver World-Class User Context, Speeding Investigations and Improving Security Outcomes

Stellar Cyber | December 20, 2022

Stellar Cyber, the innovator of Open XDR, today announced a new integration with Netskope, a global leader in secure access service edge (SASE). This powerful integration makes it easy for enterprise and MSSP users of the Stellar Cyber Open XDR platform to improve visibility of risks and threats by incorporating the rich user-centric data generated by Netskope in every investigation conducted by their security analysts. Under this integration, Netskope maintains visibility and control across five lanes of user traffic, including web, managed SaaS, unmanaged SaaS, cloud service providers, and public-facing custom apps in one single-pass cloud architecture. At the same time, Stellar Cyber ingests, normalizes, and analyzes Netskope data and all other collected data to identify potential threats creating prioritized, investigation-ready incidents. As security analysts complete incident investigations, Stellar Cyber automatically initiates response actions to third-party products integrated into the solution, including Netskope. “Making it easy for our customers that use Stellar Cyber to incorporate Netskope’s valuable user insights into their investigations is another way for us to bring them new levels of security visibility. “Making security analysts more productive means attacker dwell time decreases, reducing the risk of breach across our customer's environment.” Andy Horwitz, VP of Business Development at Netskope “Automatically incorporating Netskope’s rich user data into every investigation in the Stellar Cyber platform adds critical context that previously required significant manual effort, which should be especially important to customers with lean security teams focused on reducing the workload on their SOC analysts,” said Andrew Homer, VP, Technology Alliances at Stellar Cyber. “With this integration, we continue to deliver what our customers, and the market, expect.” About Stellar Cyber Stellar Cyber’s Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley.

Read More

Spotlight

Cloud Security Compliance is the process and act of complying with the regulatory standards for using the cloud, according to industry guidelines and associated laws. Non-compliance can lead to financial and reputational damage, business interruption and legal challenges.

Resources