The Case for Identity-Bound Biometrics for Multi-factor Authentication (MFA)

BIO-Key's Kim Biddings on Why IBB is the Best Choice to Enhance Authentication
Kimberly Biddings, VP of Product, BIO-key International, Inc.

Organizations, both private and public, have greater urgency to adopt multi-factor authentication. Besides the increase in cyberattacks, cyber insurers are now requiring MFA to maintain coverage and President Biden's cybersecurity executive order has sparked organizations to implement stronger controls, all driven by the fact that MFA has shown to prevent up to 90% of cyberattacks. But many are missing out on a key piece of building a comprehensive MFA approach, says Kim Biddings of BIO-Key. She stands behind Identity-Bound Biometrics as a critical component for a strong MFA strategy.

In this video interview with Information Security Media Group, Biddings discusses:

  • What Identity-Bound Biometrics is;
  • What’s wrong with MFA as commonly deployed;
  • Why IBB is critical to completing a strong MFA strategy.

Biddings has over 10 years of cybersecurity and Identity and Access Management market knowledge and experience, gained across multiple authentication and cybersecurity firms. Now as the VP of Product at BIO-key International, she is focused on driving growth and deployments of BIO-key’s IAM and Identity-Bound Biometric solutions. She continues to be a thought leader and advocate for evolving the way organizations and people approach cybersecurity in our everyday lives.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.