Wyly Wade

Tag: Security

Aadhaar a struggle of identity — Part 1 Identity

Aadhaar Wyly Wade

Over the coming weeks I am going provide some of my thoughts around identification (ID) and ID solutions. A critical understanding about ID systems can be neatly boxed into a single statement: Things you know; things you have; and things you are. But more on this later. Almost from the beginning, Aadhaar (in India) has struggled…

Blackstone Makes Investment in Secure Mentem

Secure Mentem, an industry leader in the human aspects of cyber security, today announced a strategic investment from Blackstone (NYSE: BX  ) , a leading asset management and advisory firm, to help the company launch Security Awareness as a Service. The service provides a turnkey, comprehensive security awareness program, tailored to diverse corporate cultures, in order to change employee security…

Controlling contagion by restricting mobility in a bioterrorist attack or an epidemic

Responding to an epidemic or bioterrorist attack with moderate travel restrictions could effectively control contagion in densely populated areas, according to a study published on Wednesday in the Journal of the Royal Society Interface. The Massachusetts Institute of Technology study compared contagion rates in two scenarios, one with travel restrictions and one without the restrictions. Previous research showed…

Iris scans gets a thumbs up from US Gov NIST; Welcome to the party 10 years late.

A new report by biometric researchers at the National Institute of Standards and Technology (NIST) uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. These findings inform identity program administrators on how…

Global Cyber Security Market to Reach $120.1 Billion by 2017 at a 11.3% CAGR

The global cybersecurity market is expected to grow from $63.7 billion in 2011 to $120.1 billion by 2017, at an estimated compound annual growth rate of 11.3% from 2012 to 2017, according to the report. “Cyberspace today is powered by a gamut of devices and applications that have made it vulnerable to threats from all kinds of users…

Cybersecurity Expert: Assume You’re Being Attacked Right Now

When it comes to IT security, it’s best to assume hackers or cybercriminals have already penetrated your network, according to cybersecurity expert Roger Cressey. Unfortunately, Cressey said, the U.S. is still dealing with many of the same problems he saw more than a decade ago, from data beaches to security critical infrastructures. “All of those issues…

Cybersecurity: More people over larger budgets

A recent survey of 167 attendees at the Black Hat conference in Las Vegas by security company Tripwire found that the majority of those surveyed (44 percent) believe increasing the number of highly skilled security workers on staff would be the most valuable action for improving information security at their organization.  Increasing security budgets also was…

No such thing as hacker-proof

Effective cyber security today means identifying threats before attacks occur and securing your most valuable assets. For starters, there is no such thing as “hack-proof”. The only device or network that is unhackable is the one that isn’t and can’t be connected to the internet or a network. The nature of cyber threats has changed—and so too should the…

Video cameras reduce use of force by police by 60%

During a 12 month trial of police wearing video cameras in Rialto, CA the use of force dropped by 60% and complaints against officers dropped by 88% William A. Farrar, the police chief in Rialto, Calif., has been investigating whether officers’ use of video cameras can bring measurable benefits to relations between the police and civilians.…

CIOs again see employees as biggest cyber security threat

CIOs seeing employees as the biggest cyber security threat; Sounds like another reason everyone should be using BiON Smartfile. But really when were employees not the biggest security risk. We have always known from countless studies and after action reports that the vast majority of frauds, security violations and risk came from employees either trying…

%d bloggers like this: