Browse Definitions:

Word of the Day


In the biometric process of fingerscanning, a bifurcation is a point in a finger image at which two ridges meet. See More

Word of the Day Archive

Newest and Updated Terms


  • Biometrics could solve authentication woes

    Biometric authentication methods, like voice, fingerprint and facial recognition systems, may be the best replacement for passwords in user identity and access management.

  • When is MFA the best choice for mobile?

    MFA can improve the security of an app by using a layered approach rather than one that relies on passwords alone. To know whether it's right for your app, weigh its pros and cons.

Buzzword Alert

selfie authentication

Selfie pay is a form of biometric authentication for financial transactions that confirms a person's identity by using facial recognition technology.

Read More

Essential Knowledge

What is emotional data and what are the related privacy risks?

SearchSecurity talks with UC Berkeley professor Steven Weber about the concept of emotional data, where it comes from and how it can potentially be ...

Researchers bypass iPhone X security feature Face ID

News roundup: In under a week after its release, researchers were able to bypass the main iPhone X security feature, Face ID. Plus, Microsoft patched...

Samsung S8 iris scanner: How was it bypassed?

Hackers bypassed the Samsung S8 iris scanner, which could spell trouble for biometric authentication. Expert Nick Lewis explains how it happened and ...

Apple claims iPhone X Face ID has better security than Touch ID

Apple announced the new iPhone X Face ID system, which replaces Touch ID in favor of facial recognition and may offer 20 times fewer false positives ...



  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...


  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.



  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...



    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

  • cloud storage service

    A cloud storage service is a business that maintains and manages its customers' data and makes that data accessible over a ...

  • cloud hosting

    Cloud hosting is the process of outsourcing an organization's computing and storage resources to a service provider that offers ...


  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.