This article is the first in a mini series of two articles that explore the need for a fundamental shift in the cybersecurity industry's approach to combating cyber crime. The discussion highlights the limitations of relying solely on advanced tools and tactics, emphasizing that such an approach can only lead to an ...
In this white paper we talk about the current challenges associated with online elections, their potential to interfere with democracy and how the anonymously validated identity model can solve the problem. The gist behind the model is that it anchors identities inversely with respect to current single sign on ...
The concept of identity is fundamental to every human inhabited environment. We are not "The Borg", we participate in society as individuals, we contribute to the whole, both as consumers but also as creators, with time, effort, ideas and beyond the philosophical debate of "who am I", from a practical standpoint, the ...
There is a huge security flaw in the fabric of the Internet. Today's IP based cyber security methods cannot differentiate malicious traffic from normal until the traffic has been consumed because IP based attribution is weak. Those working behind a VPN or a LAN look like they have a single IP address; some obfuscate ...