The Office of Management and Budget (OMB) recently released a Federal Zero Trust Strategy in support of the Executive Order on Improving the Nation’s Cybersecurity to push the adoption of zero trust principles across civilian agencies’ enterprise security architecture. In this post we discuss immediate implications of this announcement and how Stork by Algemetric relates to it.
The World Wide Web Consortium (W3C) is an international organization that develops Web standards in collaboration with member organizations, a full-time staff, and the general public. W3C, which is led by Web inventor and Director Tim Berners-Lee and CEO Jeffrey Jaffe, aims to guide the Web to its full potential.
There is a whole new series of security and privacy solutions powered by threshold security, multiparty computation (MPC), and related technologies. Those are methodologies and mechanisms that are helping to shape the secure computation of the future.
Algemetric is now a proud member of IDPro as an official Corporate Affiliate - Medium member. IDPro is an open, global non-profit industry association for identity and access management (IAM) professionals focused on knowledge sharing, mentoring, education, and certification.
With cybercrimes on the rise, while most of them are associated with weak passwords and other bad practices, multi-factor authentication (MFA) is no longer just a security option to consider. Instead, MFA is a security requirement that cannot be ignored by anyone serious about secure identity and access management. Yet, MFA is still a new concept for many people. In this post, we discuss some of the basics of MFA and its applications in the real world.
Algemetric is now a proud member of the FIDO Alliance at the Associate level. Fido Alliance, an open industry association, is changing the nature of authentication with authentication standards to help reduce the world’s over-reliance on passwords.
In a data-driven society, what are the risks for a data-sharing joint effort? How can we protect ownership over digital assets while facing risks of data loss, data copy, and unauthorized analysis? The combination of blockchain and specialized cryptographic schemes and protocols can result in a powerful solution to efficiently manage data ownership.
Development tools that adopt a user-centered approach can improve the development experience by focusing only on key components to help developers get things done.
While virtually all digital technologies take advantage of data at some capacity, some technologies are enabled and sometimes even defined in terms of how data is expressed, represented, organized, manipulated, transmitted, stored, among other aspects. This type of solution is what data-centric technologies (DCTs) are about. DCTs are not only interesting in their own merits, but they can also enable other powerful solutions with unprecedented results.