Skip to content
NovuGens
Biometrics, Blockchain and Analytics Solution
NovuGens
  • Solution
  • About
  • Use Cases
  • News
  • Careers
  • Support
  • Schedule Demo
  • globalEN
    • Español
    • Português
  • Solution
  • About
  • Use Cases
  • News
  • Careers
  • Support
  • Schedule Demo
  • globalEN
    • Español
    • Português

News

Latest Trends, Technology and Market News

The Fight for Fair Facial Recognition – by One World Identity | June 19, 2020

Just a few weeks ago, the murder of George Floyd sparked worldwide protests by and in alliance with the black community. Especially here in the US, this has immediately led to a parallel push for systemic change for domestic law enforcement. Simultaneously, this has revived media attention regarding the role of technology in perpetuating racial biases in policing—especially that of facial recognition technology.

READ MORE

Dumping passwords can improve your security – by Cnet | May 07, 2020

Passwords suck.

They’re hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. Dashlane, LastPass, 1Password and other password managers generate strong and unique passwords for every account you have, but the software is complex. Services from Google, Facebook and Apple allow you to use your passwords for their services at other sites, but you have to give them even more power over your life online. Two-factor authentication, which requires a second passcode sent by text message or retrieved from a special app each time you log in, boosts security dramatically but can still be defeated.

READ MORE

China’s Data Privacy Balancing Act – by One World Identity | June 26, 2020

China’s Data Privacy Balancing Act by One World Identity | June 26, 2020 The New York Times announced last week that China is implementing a mass DNA collection project in order to create a large-scale database that genetically maps the country’s entire male population. This news reignites concern over China’s mass surveillance system, especially as it made…

READ MORE
Biometric Data graphic

Biometrics and biometric data – by Alison Grace Johansen

Biometrics are part of the cutting edge of technology. Put simply, biometrics are any metrics related to human features. The most common examples of a biometric recognition system is the iPhone’s fingerprint and facial recognition technology. As an emerging technology, biometric systems can add great convenience by replacing passwords and helping law enforcement catch criminals. Biometric identifiers also act as access control in secure environments, both physical and digital. But the first question you should ask is: Is my biometric data secure from identity theft?

READ MORE
Biometrics graphic

By 2024, How Many Smartphone Owners Will Use Biometrics? – by PaymentsJournal | June 4, 2020

By 2024, Mercator forecasts that 66% of smartphone owners will use biometrics for authentication. Currently, Mercator estimates that 41% of smartphone owners are using biometrics. Just one year ago, in 2019 only 27% of consumers used biometrics to authenticate.

READ MORE
Data security banner graphic

8 Best Practices to Strengthen Data Security – by Mara Calvello | August 2, 2019

From Equifax to Capital One, many customers of these companies have learned the hard way that they shouldn’t have trusted these brands to keep their data secure.

A data breach like these is completely avoidable, but only if you don’t deny just how important cybersecurity is for your business and its customers. If you don’t want to be the next Capital One but are unsure how to go about enhancing your data security efforts, you’re not alone.

READ MORE
Pegasys news banner graphic

How PegaSys is Setting the Standard for Permissioning in DLT – by PegaSys | July 31, 2019

Data is precious. Protecting it and being careful and deliberate with giving access to our data and systems is a critical need. For companies building on Enterprise Ethereum, there is a real need to limit the parties that can participate in your network and be privy to the data, and what types of transactions users can make — sending funds, deploying smart contracts, etc. Enter, permissioning.

READ MORE
Final puzzle piece being placed in a puzzle

LACChain’s permissioning protocols – by LACChain Alliance | July 28, 2020

We define the permissioning protocol of a blockchain network as the process to determine whether a new node is accepted in the network or not.

The LACChain DLT networks will have two different protocols for permissioning new nodes. The first one is named Satellite Permissioning Protocol (SPP) and applies for any new node. The second one is named Core Permissioning Protocol (CPP) and applies only for core nodes. If you are not familiar with our taxonomy, you can read about our core and satellite nodes HERE.

READ MORE
Digital thumbprint graphic

The Digital Identity – by Keith Metcalfe | July 30, 2019

The march is on to establish digital identities that fully mirror the real-life identities of individuals.
This achievement will unlock more secure, seamless, and reliable interactions online for individuals and organizations alike. While the myriad online activities, multiple social media accounts, and overall immersion of the modern person may make it seem as though identities have completely migrated into the digital ecosystem, the fact is that digital identities remain highly fragmented, context-dependent, and challenging to verify.

READ MORE
Search
Recent Posts
  • The Fight for Fair Facial Recognition – by One World Identity | June 19, 2020
  • Dumping passwords can improve your security – by Cnet | May 07, 2020
  • China’s Data Privacy Balancing Act – by One World Identity | June 26, 2020
7131 Arlington Blvd
Bethesda, Maryland 20815

202-230-2339

info@novugens.com
Join Our Newsletter


Copyright © 2020 NovuGens Terms and Conditions|Privacy Policy

Schedule Demo
Go to Top

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Privacy Policy

Accept Decline
Cookie Settings