Learn

Blog
Mar 18, 2018 3 mins

Securing Autonomous Fleets with Global-Trained Localized Brains

It is possible to train machine learning models with private data sets so that no single data point is identified but statistical learning is maintained, including outliers...

Read More

Blog
Jan 16, 2018 2 mins

The Spectre of Hardware Security Looming over Intel SGX

As the fallout of the Spectre and Meltdown vulnerabilities settles, the future of in-silica security becomes fuzzier. There are many comprehensive reports on the attack...

Read More

Blog
May 23, 2017 1 min

US Senator Encourages Use of ‘Privacy Enhancing Technologies’

In a letter to the Commission on Evidence-Based Policymaking, US Senator Ron Wyden, D-Ore. proposed the use of privacy enhancing technologies (PETs) by government agencies in...

Read More

Blog
Feb 8, 2017 2 mins

Banking on [Digital] Trust

Trust cements the foundation of the banking industry. Without it, we would be more apt to keep cash stuffed under our mattresses than in the impenetrable vault of a...

Read More

Blog
Dec 30, 2016 2 mins

Behavioral Futures and Surveillance Capitalism

The inevitable onslaught of targeted advertisements has both consumers and technology companies wondering whether there is any alternative future for internet economics. ...

Read More

Blog
Nov 8, 2016 1 min

Confusion in China’s Cyber Laws

The latest in a wave of sovereign data security laws has emerged from China, causing some alarm with companies trying to understand how it could impact their businesses. ...

Read More

Blog
Aug 22, 2016 2 mins

Cloud Security by the Numbers

With over 3,000 IT professionals surveyed, the recent Ponemon study sponsored by Gemalto addressed issues concerning the "Global State of Cloud Data Security." The webcast...

Read More

Blog
Jul 12, 2016 1 min

Open Camps Conference at UN

The world's largest mission-driven open source conference, Open Camps aims to "break down barriers to technology innovation through open source governance, communities and...

Read More

Blog
Jun 16, 2016 1 min

Gone, Not Forgotten.

Strong privacy laws that establish the 'right to be forgotten' may be unenforceable. EU citizens can request that search engines remove results that are no longer relevant...

Read More

Blog
Jun 5, 2016 1 min

[Secure] Sharing is Caring

Keyword search is enabled on shared data by utilizing a key exchange system based on standard public and secret key cryptography. The _ultra encrypted key architecture allows...

Read More

Blog
Mar 17, 2016 1 min

Rethinking IoT Security

With over 20 billion devices coming online by 2020 and an estimated 25 vulnerabilities per product, it's no wonder that IoT security is a hot topic. While acknowledging that...

Read More

Blog
Mar 7, 2016 1 min

Safe Harbor 2.0 and the reaction of cyber imperialists

Mr. Schrems has his doubts about 'Safe Harbor 2.0', according to his recent interview with Ars Technica. Others have been quick to jump on board with dissent, eyeing...

Read More

Blog
Mar 2, 2016 1 min

Attack of the Ombudsperson

The draft document for ‘Safe Harbor 2.0’ was released on March 2, and is pending review and approval by the EU Article 29 Working Party by the end of March (sure). ...

Read More

Blog
Feb 5, 2016 0 mins

EU’s GDPR Could Cost Firms up to $20m (4% of…

Firms are spending tens to hundreds of millions building new data centers in the EU to comply with post safe-harbor regulations in order to avoid hefty fines; up to $20m USD...

Read More

1 2 3 4