In this Spotlight edition of The Security Ledger Podcast, sponsored by CyberArk*, we interview serial entrepreneur Gil Rapaport about his latest creation: Alero, a new remote authentication tool that promises to fix remote vendor access by doing away with passwords…and agents…and VPNs. If that sounds like a tall order, check out our podcast to learn how he does it!
In this week’s episode, #142: we continue our series on Life after Passwords: the Future of Online Identity as we are joined by Ophir Gaathon, the CEO of the firm Dust Identity.
Alpha-numeric passwords have been with us almost since the dawn of the computing age. But our guest this week, Phil Dunkelberger the CEO of Nok Nok Labs, says they’ve overstayed their welcome, and that the next few years may see them disappear altogether. We talk about what will replace them and how.
Enlarge / A U.S. Customs and Border Protection officer checks identifications as people cross into the United States from Mexico on September 23, 2016 in San Ysidro, California. (credit: John Moore / Getty Images News)
If a new Senate Republican border security bill is passed as currently drafted, it would dramatically increase the amount of surveillance technologies used against immigrants and, in some cases, American citizens traveling to and from the United States.
The bill, known as the “Building America’s Trust Act,” is authored by Sen. John Cornyn (R-Tex.). It aims for a “long-term border security and interior enforcement strategy,” according to its summary. However, the senators have yet to formally introduce the text of the bill.
So Ars is going to do it for them: we received an advance copy of the bill’s text from an anonymous source, and we are publishing it here before it has been formally introduced in the Senate. Ars repeatedly contacted the offices of all six senators who are listed as co-sponsors for comment—none made anyone available.
Read 19 remaining paragraphs | Comments …read more
In-brief: a study of millions of mobile and desktop endpoints finds continued problems with out of date software and a willingness to fall for phishing attacks.