International travelers can expect to see more facial recognition and other biometric technologies per the latest national security strategy document.
CSIAC SME and member of the American Bar Association’s Information Security Committee, Richard “Rick” Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks. These slides focus on emerging issues such as consumer privacy rights, forensic border search of computers, search consent,
Dr. Robert Wright, AIS, Senior Advising Engineer Binghamton University, Ph.D., Computer Science, 2014 Dr. Robert Wright brings 15 years of proven experience developing advanced machine learning technologies that deliver revolutionary capabilities for the DoD. Dr. Wright is a senior advising research scientist with AIS and a Principal Investigator for the
In 2016, more than three billion passwords were harvested from breaches by criminals in the U.S., according to Shape Security."Criminals exchange passwords on the Dark Web and use a technique called credential stuffing to apply passwords to targeted web domains and automatically attempt authentication for tens of thousands of compromised passwords," Routh
Biometrics is the “something you are” identity factor used in authentication and identification systems. Organizations that rely on biometric technology should ensure the confidentiality, integrity and authenticity of their biometric assets. To manage security risk, biometric information should be protected from unauthorized access and modification. * The
The latest wearable tech to get people talking isn’t an activity tracker or a watch. It’s a glove that gives the wearer an entirely new set of fingerprints, fooling even the best fingerprint scanners on the market.
In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices.
The more sophisticated the system, or the more critical, private information that system holds, the more advanced the identification system protecting it becomes.
University of Washington computer scientists and electrical engineers have devised a way to send secure passwords through the human body.
Mobile platforms offer a significant operational advantage to public safety stakeholders by giving them access to mission critical information and services while deployed in the field, during training and exercises, or participating in the day-to-day business and preparations during non-emergency periods. However, these advantages can be limited if