Facial Recognition Is Now Easy to Implement: What Does That Imply?
Movies and television shows are full of scenes where individuals are recognized in huge crowds using facial recognition software. Until recently, some of those seemed far-fetched or maybe prohibitively expensive. That is no longer the case. Sahil Chinoy described a facial recognition demonstration in The New York Times. He and his team built a sub-100 […]
Another Breach of Data Stored In The Cloud. Please stop.
I have a love-hate relationship with ”the cloud”. I love how easy it is to create services, easily access software and data, and I love the easy sharing of data. But I seriously hate how easy it is to unintentionally expose data that should remain confidential. In April of this year, the Telegraph reported on […]
More on Biometrics and Privacy
Last time I wrote about Biometrics and Privacy. Part of that involved the training of the networks needed to recognize individuals either for authentication or in images. A good description of the process of “training” the networks to recognize the images is the third part of the Medium series I referenced then. As the article […]
GDPR: What You Need to Know and Do
GDPR or the General Data Protection Regulation takes effect next May. It’s an EU regulation. However, everyone must comply with it or else suffer heavy financial penalties and risk criminal prosecution. What Is GDPR? Simply put, the GDPR requires strong protection of personal privacy of people in the EU. Violations can lead to crippling fines, […]
How Can We Help Users Improve Security?
Maybe we should rename CIA. I don’t mean the government agency by that name. I’m risking heresy by saying that the tired old acronym CIA for Confidentiality, Integrity, and Availability isn’t sacred text. We talk about CIA in Learning Tree’s System and Network Security Introduction course. Let’s take a critical look at it here. I’ve […]