Facial Recognition Is Now Easy to Implement: What Does That Imply?
Aug 7,
2019
Movies and television shows are full of scenes where individuals are recognized in huge crowds using facial recognition software. Until recently, some of those seemed far-fetched or maybe prohibitively expensive. That is no longer the case. Sahil Chinoy described a facial recognition demonstration in The New York Times. He and his team built a sub-100 […]
Another Breach of Data Stored In The Cloud. Please stop.
Jul 11,
2019
I have a love-hate relationship with ”the cloud”. I love how easy it is to create services, easily access software and data, and I love the easy sharing of data. But I seriously hate how easy it is to unintentionally expose data that should remain confidential. In April of this year, the Telegraph reported on […]
More on Biometrics and Privacy
Dec 13,
2018
Last time I wrote about Biometrics and Privacy. Part of that involved the training of the networks needed to recognize individuals either for authentication or in images. A good description of the process of “training” the networks to recognize the images is the third part of the Medium series I referenced then. As the article […]
GDPR: What You Need to Know and Do
Oct 17,
2017
GDPR or the General Data Protection Regulation takes effect next May. It’s an EU regulation. However, everyone must comply with it or else suffer heavy financial penalties and risk criminal prosecution. What Is GDPR? Simply put, the GDPR requires strong protection of personal privacy of people in the EU. Violations can lead to crippling fines, […]
access control,
Cloud Computing,
cloud services,
compliance,
data breaches,
encryption,
GDPR,
General Data Protection Regulation,
key management,
privacy,
SIEM
How Can We Help Users Improve Security?
Aug 2,
2017
Maybe we should rename CIA. I don’t mean the government agency by that name. I’m risking heresy by saying that the tired old acronym CIA for Confidentiality, Integrity, and Availability isn’t sacred text. We talk about CIA in Learning Tree’s System and Network Security Introduction course. Let’s take a critical look at it here. I’ve […]