Posts Tagged ‘data security’

HTTPA Will Let You Track How Your Private Data is Used

oshani-seneviratne_bv13_0

Larry Hardesty of the MIT News Office reports, “By now, most people feel comfortable conducting financial transactions on the Web. The cryptographic schemes that protect online banking and credit card purchases have proven their reliability over decades. As more of our data moves online, a more pressing concern may be its inadvertent misuse by people authorized to access it. Every month seems to bring another story of private information accidentally leaked by governmental agencies or vendors of digital products or services. At the same time, tighter restrictions on access could undermine the whole point of sharing data. Coordination across agencies and providers could be the key to quality medical care; you may want your family to be able to share the pictures you post on a social-networking site.” Read more

Hoyos Labs Issues $78,000 Research Grant to Villanova University

hoyo

NEW YORK, Feb. 13, 2014 /PRNewswire/ – In order to further technological advancements in secure identity authentication, Hoyos Labs, a digital infrastructure company, has provided a $78,000 research grant to Villanova University in the area of computer security focusing on identity assertion, role gathering, adjudication and access control.

 

Hoyos Labs’ identity assertion products use a multi-biometric recognition system that includes the face, periocular region and iris to confirm one’s identity. The technology leverages smartphones via its app, HoyosID, as biometrics acquisition devices (on the front-end), interacts with middleware and accesses the back-end before identity authentication. This system tackles the unmet needs in identity security, such as incorporating “liveness,” which detects a real person from an image or video in a quick and easy-to-use manner. Read more

10 Considerations for Securing the Internet of Things

10447375095_03bde7458d

Mark O’Neill, VP of Innovation at Axway recently wrote for Silicon Angle, “Welcome to the future, where smart meters monitor your home appliance usage, where fitness devices on your wrist track your heart-rate, and where electric vehicles can take commands from your wristwatch. What does all of this have in common? These innovations are all part of the Internet of Things (IoT). While the Internet of Things is going through a rosy honeymoon period at the moment, security issues are slowly creeping to the surface. There’s a growing awareness that IoT devices are riddled with vulnerabilities, and securing these weaknesses will soon become one of the major priorities for both manufacturers and the people who use them. Let’s examine the top 10 things to consider in detail.” Read more

Ushering in Cyber 3.0

cyber

John Trobough of Business 2 Community recently wrote, “From narrowband to broadband, from kilobits to gigabits, from talking people to talking things, the volume of data in the world has reached epic proportions… and it’s only the beginning. Data is entering and leaving enterprises at unprecedented rates, and is often stored and accessed from a range of locations, such as from smartphones and tablets, virtual servers or the cloud. As the Internet has evolved, so has cybersecurity and the need for increased data analytics. Humans can no longer keep up with the data driven world, but machines can. By enabling semantic Web’s automated, continuous machine learning to create context out of interactions and data, security efforts will have continuous visibility and better control over digital assets. This future of machine learning is known as Cyber 3.0.” Read more

Make Enterprise Search Better For Users, And Better For IT

rsz_searchHow seamlessly are employees able to conduct searches for enterprise data?

According to a new survey from SearchYourCloud, not very. Some searches, it finds, take up to 25 minutes, and often users have to do 8 different queries until the right document is found. Only 1 in 5 searches come out with correct results the first time. “That’s appalling in this day and age,” says founder and CEO Simon Bain.

Read more

Delfigo Security Awarded US Patent on Event-Driven AI Architecture

BOSTON, Sept. 12, 2013 /PRNewswire-iReach/ — Delfigo Security filed for United States Patent protection (US Serial No: 12/221,757) on August 6, 2008 for Combining Artificial Intelligence (AI) Concepts with an Event-Driven Security Architecture. Since that date, Delfigo has developed and implemented key concepts described in this original patent, such as cloud and mobile authentication as well as intelligent mobile fraud detection.  This key patent was awarded to Delfigo on September 12, 2013. Read more

“Coverlet Meshing” Weighs in on PRISM

The debate about PRISM continues. One of the latest volleys was posted in InformationWeek by Coverlet Meshing (a pseudonym used by “a senior IT executive at one of the nation’s largest banks.”) Meshing wrote: “Prism doesn’t scare me. On 9/11, my office was on the 39th floor of One World Trade. I was one of the many nameless people you saw on the news running from the towers as they collapsed. But the experience didn’t turn me into a hawk. In fact, I despise the talking heads who frame Prism as the price we pay for safety. And not just because they’re fear-mongering demagogues. I hate them because I’m a technologist and they’re giving technology a bad name.” Read more

WolframAlpha Updates Its Personal Analytics for Facebook

Back in September WolframAlpha unveiled its Personal Analytics for Facebook. With Personal Analytics, which The Semantic Web Blog covered here, you could visualize your networks, friends and social activities – and late last month it was updated to give even more insight into you and your Facebook linkages.

Not in the same way that Facebook does with its recently-launched Graph Search (see our story here). It’s not, for example, going to tell you who else out there likes running and lives in Nassau County, NY, or your favorite books that your friends also have read. In its initial debut, Personal Analytics for Facebook would show you things like gender distribution among your friends, or their common names, or who you share the most friends with.

Read more

White House Creates Blueprint for Consumer Privacy Bill of Rights

The Obama administration has announced a blueprint for a consumer privacy bill of rights. The President’s cover letter to the proposal stated, “Never has privacy been more important than today, in the age of the Internet, the World Wide Web and smart phones.  In just the last decade, the Internet has enabled a renewal of direct political engagement by citizens around the globe and an explosion of commerce and innovation creating jobs of the future. Much of this innovation is enabled by novel uses of personal information. So, it is incumbent on us to do what we have done throughout history: apply our timeless privacy values to the new technologies and circumstances of our times.” Read more

Meronymy SPARQL Database Server To Debut With Emphasis on High Performance

Coming in June from start-up Meronymy is a new RDF enterprise database management system, the Meronymy SPARQL Database Server. The company, founded by Inge Henriksen, began life because of the need he saw for a high-performance and more scalable RDF database server.

The idea to focus on a database server exclusively oriented to Linked Data and the Semantic Web came as a result of Henriksen’s work over the last decade as an IT consultant implementing many semantic solutions for customers in sectors such as government and education. “One issue that always came up was performance,” he explains, especially when performing more advanced SPARQL queries against triple stores using filters, for example.

Read more

NEXT PAGE >>