New Study Confirms Passwords Are Weakest Link in Security

By Ian E. Muller | April 17, 2018
A day doesn’t go by that we don’t hear about a new data breach. Larger organizations are being targeted, more records are being stolen, and nothing we’re doing is stemming the tide. But at least we know how they happen. According to the 2017 Verizon Data Breach Investigations Report, 81 percent of data breaches were […]
Read More

Government Biometrics Use Benefits Public, Law Enforcement

By Ayenna Cagaanan | April 13, 2018
This issue of the Weekly Cypher explores how different government uses of biometrics affect privacy, and how the public is benefiting from them.
Read More

Blockchain is a Highway: Blame the Drivers, Not the Road

By John Callahan | April 12, 2018
Blockchain technology offers great potential to revolutionize how we store, access, and share data digitally. From protecting our digital identities to sharing photos of cats (the favorite pastime of the Internet), blockchain is simply a new way to transmit information. Any information. And just like previous technologies used for the same ends, that information could […]
Read More

Sounds Phishy: Why You Should Use Strong Authentication

By Ayenna Cagaanan | April 10, 2018
March 24, 2016, started off like any other day. As I hit snooze on my cell phone alarm, I turned over in my bed, scrolled through my social media, and checked a few emails from the surprisingly large amount that had already accumulated. One email from financial aid asked me for my username and password […]
Read More

Kerberos and Biometrics: Guarding the Gates of Windows

By Ward Rosenberry | April 9, 2018
Most people in the technology world have heard of Kerberos. Windows Active Directory domains use the Kerberos protocol to allow single sign-on access to network services. Kerberos didn’t just appear on the scene one day. It evolved out of Project Athena, a huge technology effort in the 1980s by the Massachusetts Institute of Technology (MIT), […]
Read More

‘Out with the Old’ When it Comes to Identity Verification

By Ayenna Cagaanan | April 6, 2018
This issue of the Weekly Cypher explores the rise of biometric authentication systems replacing decades-old identity verification processes.
Read More

It’s Time to Lay Passwords to Rest

By Sarah Landes | April 5, 2018
Week after week another company is added to the growing list of massive data breaches. Your data, my data, everyone’s data is out there now – there is no turning back. You might think the rumors about the death of passwords are nothing but gossip, but they truly are the weakest link in securing your […]
Read More

Biometrics in Humanitarian Efforts

By Ayenna Cagaanan | April 3, 2018
Humanitarian organization work in extremely volatile situations. From refugee camps to war zones, officials must make decisions efficiently and thoughtfully. With precious data on the line, maintaining integrity while providing privacy, these organizations turn to biometrics for convenience and security. Here are some benefits and critiques of using biometric authentication programs in these organizations. Uses […]
Read More

Levels of Security and Privacy

By Ayenna Cagaanan | March 30, 2018
This issue of the Weekly Cypher explores the varying degrees of security and privacy that surround biometric verification technologies, and why they’re important.
Read More

Facial Recognition for All

By Ayenna Cagaanan | March 23, 2018
The Weekly Cypher is specially curated to keep you up-to-date on the latest in cybersecurity, biometrics, and related news and innovations. Here are a few of the headlines you might have missed this week: Lost Kiwi Cats and Dogs Found with Facial Recognition Tech| findbiometrics Lost your cat or dog? Have an Instagram photo of […]
Read More