Sat.May 28, 2016 - Fri.Jun 03, 2016

article thumbnail

Microsoft believes blockchain tech could help fight human trafficking, child exploitation

Tech Republic Security

Microsoft is partnering with ConsenSys and Blockstack Labs to build an open source, blockchain-based identity system to help provide legal identification for people around the world.

108
108
article thumbnail

Russian facial recognition program beats Google, but big privacy questions linger

Tech Republic Security

NTechLab's facial recognition app uses AI to identify a face among billions of photos in less than a second, and is one of the best in the world, but the Russian startup draws concerns from academics.

103
103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why data-driven analysis must inform healthcare IT security decisions

Tech Republic Security

An Information Security manager makes the case for an analytical approach to stem the staggering number of data breaches suffered by the healthcare industry.

article thumbnail

Former NSA and CIA director recommends managing consequences instead of vulnerabilities

Tech Republic Security

Michael Hayden believes managing vulnerabilities is untenable and consequence management using the Risk Equation is preferable. Read about the equation's components.

Risk 84
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Samsung Knox isn't as secure as you think it is

Tech Republic Security

Israeli researchers recently found a slew of security flaws in the Samsung Knox security system commonly used in Android phones.

76
article thumbnail

Three important security upgrades to Android N

Tech Republic Security

Jack Wallen thinks the "N" in Android N stands for Next Level, because Google provides next-level security improvements.

68