Divided We Conquer? Why A Shared Secret Fails Security and Privacy
By Ian E. Muller | January 16, 2018
One-time password (OTP) security schemes are used by software or hardware tokens for 2FA authentication. This method uses a shared secret key, stored on the token and also on the Authentication Manager server, to validate the end user and grant them access, when used in conjunction with a traditional username and password. With biometrics, a […]Read More
Biometric Privacy is of the Utmost Importance
By Asem Othman | July 25, 2017
This is the first in a series of blogs diving into the technical aspects of Veridium’s distributed data model, biometrics, and computer vision research and development by our chief biometric scientist Asem Othman. Classical biometric systems capture the biological attributes of an individual as images and transform them into a lower dimensional feature space, otherwise […]Read More
Visual Cryptography Keeps Biometrics Secure
By Ian E. Muller | April 18, 2017
We talk at length about the importance of keeping biometric data secure, but it’s also important to highlight the technology that’s used to do so. One method we recommend for securing biometrics and keeping them private is visual cryptography. This form of encryption uses a unique approach to eliminate some of the riskier elements of […]Read More
Is Data Privacy Impossible in an IoT World?
By Ian E. Muller | April 4, 2017
We focus on the dangers of the Internet of Things (IoT) a great deal. How the proliferation of these devices, and their lack of access security, allow hackers to hijack them for botnets is only one piece of this danger, however. As we invest more in home automation and other interconnected technologies, we’re also putting […]Read More
The Death of SHA-1
By Ian E. Muller | February 28, 2017
Security experts have been warning against the use of SHA-1 for years. The aging cryptography algorithm was an initial foray into hash-based security. The second iteration of Secure Hash Algorithm, SHA-1 was developed in 1995, and since there have been new versions, from SHA-2 to SHA-256, developed. However, SHA-1 is still in heavy use today […]Read More
How Easily Could an IoT Industrial Disaster Happen?
By Jason Braverman | February 7, 2017
IoT is not a new thing. Big industry, especially large refineries and chemical manufacturing plants have been using radio frequency sensors to monitor things like temperature, pressure, light, and vibration on pipes and storage tanks for decades. These sensors send their information to radio receivers which then take that data and feed it to databases. […]Read More
Protect My Network, Please!
By Jason Braverman | December 13, 2016
This is the frustrated mantra we have all been hearing time and again: “Protect my network! Please!” The sad part is, we keep doing the same things over and over again and expecting different results, a phrase that is often called the definition of insanity. To be fair, the problem isn’t that network administrators and […]Read More
Privacy in a Big Data World
By Ian E. Muller | May 31, 2016
Big data is inescapable today. Everywhere we turn, some company or agency is gathering information on a massive scale. From Facebook to the FBI, it has become a commodity, and the more you can gather, the “richer” you are. In this age of digital overload, how can you maintain privacy? What is Big Data? One […]Read More