Post Tagged with: "database"

Internet of Tattoos? NIST Workshop Plumbs Body Art Algorithms

June 22, 2015 08:121 comment
A NIST workshop explored approaches to automatic tattoo identification using artificial intelligence.

In-brief: One in five adults in the U.S. sport body art, making tattoos a useful tool for identifying both criminals and their victims. A NIST workshop explored ways to use AI to better identify and catalog tatts.  Like this:Like Loading…

Read more ›

Amazon’s Springs for IoT Telemetry Startup 2lemetry

March 16, 2015 11:310 comments
Amazon said last week that it acquired 2lemetry, an IoT focused middleware and analytics firm.

In-brief: 2lemetry, a Denver, Colorado-based startup that manages data from Internet connected devices said last week that it had been acquired by cloud giant Amazon.com. Like this:Like Loading…

Read more ›

Red Flags Abound in 2013 Anthem Security Audit

March 5, 2015 14:58Comments Off on Red Flags Abound in 2013 Anthem Security Audit
A report from a federal auditor raised serious concerns over Anthem's internal IT practices - two years before the company announced it had been hacked.

In-brief: A 2013 audit of Anthem Inc. contains a number of red flags about the company’s internal information security practices, and suggests Anthem was trying to mislead auditors to avoid scrutiny.  Like this:Like Loading…

Read more ›

Are Data Lakes A Key To Securing IoT Environments? | Tripwire Blog

January 2, 2015 12:46Comments Off on Are Data Lakes A Key To Securing IoT Environments? | Tripwire Blog
Are Data Lakes A Key To Securing IoT Environments? | Tripwire Blog

Mitch Thomas over at the security firm Tripwire has a good post on “architecting the security of things” that’s worth checking out. As an incumbent security vendor, Tripwire faces the same challenges and problems as other vendors who came of age securing traditional endpoints and enterprise IT environments. Among them: adapting to a nearly limitless population of new endpoints – many of them small, resource constrained embedded systems.  As we’ve noted before: many of these systems aren’t capable of the kinds of interrogations (vulnerability- and malware scans just two examples) that many security tools take for granted. Like this:Like Loading…

Read more ›
%d bloggers like this: