The Fight for Fair Facial Recognition – by One World Identity | June 19, 2020

Just a few weeks ago, the murder of George Floyd sparked worldwide protests by and in alliance with the black community. Especially here in the US, this has immediately led to a parallel push for systemic change for domestic law enforcement. Simultaneously, this has revived media attention regarding the role of technology in perpetuating racial biases in policing—especially that of facial recognition technology.

Dumping passwords can improve your security – by Cnet | May 07, 2020

Passwords suck.

They’re hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. Dashlane, LastPass, 1Password and other password managers generate strong and unique passwords for every account you have, but the software is complex. Services from Google, Facebook and Apple allow you to use your passwords for their services at other sites, but you have to give them even more power over your life online. Two-factor authentication, which requires a second passcode sent by text message or retrieved from a special app each time you log in, boosts security dramatically but can still be defeated.

Biometric Data graphic

Biometrics and biometric data – by Alison Grace Johansen

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. The most common examples of a biometric recognition system is the iPhone’s fingerprint and facial recognition technology. As an emerging technology, biometric systems can add great convenience by replacing passwords and helping law enforcement catch criminals. Biometric identifiers also act as access control in secure environments, both physical and digital. But the first question you should ask is: Is my biometric data secure from identity theft?

Data security banner graphic

8 Best Practices to Strengthen Data Security – by Mara Calvello | August 2, 2019

From Equifax to Capital One, many customers of these companies have learned the hard way that they shouldn’t have trusted these brands to keep their data secure.

A data breach like these is completely avoidable, but only if you don’t deny just how important cybersecurity is for your business and its customers. If you don’t want to be the next Capital One but are unsure how to go about enhancing your data security efforts, you’re not alone.

Pegasys news banner graphic

How PegaSys is Setting the Standard for Permissioning in DLT – by PegaSys | July 31, 2019

Data is precious. Protecting it and being careful and deliberate with giving access to our data and systems is a critical need. For companies building on Enterprise Ethereum, there is a real need to limit the parties that can participate in your network and be privy to the data, and what types of transactions users can make — sending funds, deploying smart contracts, etc. Enter, permissioning.

Final puzzle piece being placed in a puzzle

LACChain’s permissioning protocols – by LACChain Alliance | July 28, 2020

We define the permissioning protocol of a blockchain network as the process to determine whether a new node is accepted in the network or not.

The LACChain DLT networks will have two different protocols for permissioning new nodes. The first one is named Satellite Permissioning Protocol (SPP) and applies for any new node. The second one is named Core Permissioning Protocol (CPP) and applies only for core nodes. If you are not familiar with our taxonomy, you can read about our core and satellite nodes HERE.

Digital thumbprint graphic

The Digital Identity – by Keith Metcalfe | July 30, 2019

The march is on to establish digital identities that fully mirror the real-life identities of individuals.
This achievement will unlock more secure, seamless, and reliable interactions online for individuals and organizations alike. While the myriad online activities, multiple social media accounts, and overall immersion of the modern person may make it seem as though identities have completely migrated into the digital ecosystem, the fact is that digital identities remain highly fragmented, context-dependent, and challenging to verify.