Tag Archive for: innovation

Computer Scientist Explains One Concept in 5 Levels of Difficulty | WIRED



Investigations and Identity Innovation: This Week’s Top Mobile ID Stories


Investigations and Identity Innovation: This Week's Top Mobile ID Stories

It’s a motley mix in this week’s roundup of Mobile ID World’s top stories, featuring a couple of important investigations, authentication innovation, a notable new partnership, and, as is so often the case these days, some digital ID news.

The latter comes by way of Luxembourg, where citizens now have access to a government-issued mobile app that can be used for remote identity verification when accessing online government services. The GouvID app leverages MRZ reading and contactless communications to interact with a citizen’s physical ID card, and supports the use of biometric authentication on their mobile device for additional security and convenience:

Luxembourg Government Launches ID App for e-Services Authentication

As for the aforementioned investigations, one of them concerned the IRS and its remote identity verification partner ID.me. The organizations’ partnership provoked controversy earlier this year when the IRS announced that Americans filing their taxes online would have to undergo a biometric identity verification process using ID.me’s technology. In the wake of the backlash, the IRS and ID.me enabled a non-biometric identity verification options; nevertheless, Congress is now getting involved, with the House Oversight Committee and the House subcommittee for issues related to COVID-19 opening a formal investigation into the project:

Congress Investigates IRS’s Remote Onboarding Partner

The other investigation that stoked reader interest this week has already concluded. Okta had hired a third-party forensic firm to look into a hack attack the authentication specialist had suffered in January, and the company has now come forward with the results of the investigation. It wasn’t nearly as bad as the worst-case scenario that had previously been envisioned:

Investigation Finds Only Two Clients Affected in Okta Security Breach

The week’s big authentication innovation news, meanwhile, came from Facebook’s parent company. Meta’s engineers have come up with a new Anonymous Credential Service that is designed to allow large-scale authentication of individuals without requiring them to share any personal information. Meta says its ACS helps to…

Source…

Security Expert Kevin L. Jackson Launches Security Innovation Based On The BlockChain Fit For The Cyber Warfare Age


Press release content from Prodigy News. The AP news staff was not involved in its creation.

04/08/2022, Concentric Media Inc. // PRODIGY: Feature Story //

Security expert Kevin L.Jackson has lent his expertise to the launch of a new service based on innovative blockchain technology. In partnership with Total Network Services Inc., this innovation can help secure supply chains and ensure individual users can identify and remediate compromised devices in their network.

The Universal Communication Identifier (UCID) is the world’s first blockchain-enabled service for supply chain security, device management, software licensing, and equipment tracking.

One of UCID’s key features is the tokenization of all connected devices onto a blockchain, which will improve visibility on when and where a hack has occurred, across all connected devices. Users will also have a record of information transactions associated with that device.

This is crucial in an age where our devices are increasingly interconnected – especially through the Internet of Things (IoT) – and are susceptible to hacking.

‘Increasingly, the rise of connected devices, and IoT devices, means that we will be providing cyberwar hackers with more opportunities for to steal data and compromise the global information and telecommunications infrastructure ,’ says Jackson.

On an individual level, this could mean hacking into baby monitors, CCTV, or smart cars for ransom money.

Meanwhile, corporations are increasingly susceptible to software supply chain attacks on key aspects of their businesses. From compromising payment platforms to attacking devices further down in the chain by third-party devices, in today’s internet age, The SolarWinds hack in 2020, which disrupted more than 30,000 public and private organizations, is just an example of how vulnerable corporate supply chains are today.

UCID helps address these issues. Service capabilities include automated hardware and software bill-of-material documentation, counterfeit device detection, and software remediation monitoring give users more…

Source…

Balancing Speed, Security and Innovation


Today, digital transformation (DX) is happening in every industry. Organizations operating in sectors that typically eschew technology are moving to the cloud, leveraging IoT and using analytics. Digital transformation plays a critical role for any company to stay competitive and resilient.

But what does digital transformation look like for most companies, and more importantly, how does cybersecurity fit in? What is the best approach when more networks, apps, data and endpoints need to be secured?

What is Digital Transformation?

Digital transformation holds different meanings for different people. But at its core, digital transformation describes the process of improving or upgrading your business by taking advantage of the latest applications, services and technologies. 

When you think about it, digital transformation is nothing new. Remember when organizations shifted from mainframe to PC computing back in the 80s? That was an earlier form of digital transformation. 

But today, digital transformation typically leverages third platform technologies like cloud. Third platform technologies also include data analytics, along with other acceleration technologies like IoT and mobile apps. Altogether, this technology is used to transform business operations. 

There are three primary goals of digital transformation: agility, flexibility and scalability. Agility to meet customer and market demands, flexibility to accommodate the new and ever-changing demands of the workplace and workforce and scalability to enable your organization to get more done.

First, it’s crucial to understand what is driving digital transformation. It’s also important to note that while the two terms mean different things, in most cases, digital transformation and cloud transformation can be used interchangeably.

All About the Cloud

With cloud technology, the barrier to entry for digital transformation is lowered enough so industries that typically have little to do with technology can reap the benefits of modern solutions. Today, the cloud enables blazing-fast transmission speeds, abundant storage capacity and extensive mobile functionality. 

Not surprisingly, these…

Source…