As a lifelong engineer, my career has been dramatically impacted by the open source movement, along with those of my fellow engineers. Growing up in a business environment where closed platforms once dominated, many of us had to recalibrate our thinking as the open source revolution in the 90’s unfolded.…
Read More
Great security depends on the ability to know who is authorized and who is not. This applies to both physical and digital security. But how do you accomplish this? Increasingly, one answer is facial recognition, which is improving rapidly thanks to artificial intelligence (AI) and related technologies. Hundreds of thousands…
Read More
This is the second installment in a three-part series. Be sure to read part one and stay tuned for part three to learn more. Partnering with a new fraud protection and authentication vendor can seem overwhelming. You may be asking yourself, “Where do I start?” or, “How will my team…
Read More
In June 2019, a study on mobile app vulnerabilities presented some incredible and worrisome findings. Most notably, high-risk vulnerabilities were found in 43 percent of mobile apps for Android and 38 percent for iOS, according to Positive Technologies. Now, consider this: In terms of market share, per IDC, Android owns…
Read More