Tag Archives: Authentication

Selfie Based Authentication| Authentication History and the Future

To understand the future let’s take a quick look at the past. Stonewall Jackson (Civil War), China Qin Dynasty Hand Prints 200 BC, Francis Dalton Finger Prints.

Do you want to know pros and cons with various authentication methods of the future? IRIS, Selfie Based Authentication, Voice, Finger Print, Face Recognition, Gesture and other Trends in Mobile Security.

What is the Best Biometric Authentication Methods for Mobile Apps?

Continue reading

Big Data Security AND – Waste Water, Cholera, Small Pox, Germ Theory, Data De-Identification | Podcast Episode #10

Davi Ottenheimer

Davi Ottenheimer, EMC Sr. Director of Trust

My next guest today approaches Big Data security in a way that you have not heard before. We start off philosophical and then dive into the technical. No matter what your strength or inclination on this topic we cover it.

Today’s top CIOs need to look around the corner of security. There is an agility of thinking, strategy, insight and philosophy needed to navigate Big Data Security waters.

Davi Ottenheimer is EMC Senior Director of Trust, has more than twenty years’ experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of the book “Securing the Virtual Environment: How to Defend the Enterprise Against Attack,” published in May 2012 by Wiley.

Continue reading

Are You Growing Grass or Building a Bomb?

Article cover image

.Why Big Data and ‘Context’ is Critical for Security and Privacy..

How do you know that the fertilizer that is being purchased is for nourishing the land for our food supply, growing our grass, tending to our fields, or is being used to make a bomb?

You don’t – unless you have context….

Continue reading