Craig opens the show and reviews and comments on Tech in the News. This week he discusses Google Secure Searches, Internet moving abroad, Tools to make life better, Tel Aviv growth, and the Chrome XP lifeline.
Claeb Sima the CEO of BlueBox Security joins Craig to discuss web security, penetration testing and the identification of emerging security threats. While BYOD has both resulted in increased flexibility for users and improved productivity at work, it has brought with it questions and concerns about the security of corporate data. Founded in 2012 Bluebox is a stealth startup tackling the challenges of mobile security. Bluebox has been recognized by Gartner as a “Cool Vendor” and by CIO as a “Must-Watch Security Startup.” Bluebox is backed by a $9.5 million investment by Andreessen Horowitz, SV Angel and number of notable angels including Sun Microsystems co-founder, Andreas von Bechtolsheim. Bluebox is still in stealth, so they cannot discuss their product specifically. They are a mobile security company.
Alok Bhardwaj the founder of Hidden Reflex joins Craig to discuss web browsers and privacy services. Epic is the
first browser built on chromium dedicated to protecting your privacy. In Chrome, virtually every site you visit & search entered is being tracked by Google as well as hundreds of other companies. An out-of-the-box browser built on chromium that doesn’t let Google or anyone else track what you browse & search.
Mark Bell the EVP Operations at Digital Defense joins Craig to discuss managed security risk assessment solutions. Whether your organization is large or small, you may already have vulnerabilities, lurking in the background, ready to pose a significant danger to your organization. Especially as your organization changes or grows, new threats to the security of your information may emerge. These risks and vulnerabilities often go undetected until it’s too late. Failure to assess your computing network and physical environment can lead to data breaches, interruption of services, financial loss and, even worse, irreversible damage to your reputation. In today’s high-risk environment, security awareness training must break through information overload in the workplace. SecureEd™, DDI’s latest high-impact training program, provides clients with a highly engaging, creative approach that facilitates security-minded behavior.
DDI also offers a comprehensive array of assessment solutions, services in addition to Vulnerability Scanning Solutions. And while vulnerability scanning is the cornerstone element of an effective security program, DDI’s security risk assessment solutions provide an additional layer of security through a holistic view of your organization’s security.
Hector Hoyos the owner and founder of Hoyos Labs joins Craig to discuss iris-based identity authentication. The iPhone 5S uses fingerprint technology to unlock devices, but fingerprints are not optimal for security, as they are easily replicated and have a high false-accept rate. To date, attempts to introduce fingerprints for secure access purposes have failed, which concerns business owners who foresee consumers using them to access confidential accounts. Hoyos Labs’ goal is to productize technologies like iris scanning and translate them into real-world solutions that solve identity challenges. There is a next-generation technology for mobile identification authentication that does not use, and is more effective than, fingerprints. It is currently being developed by Hoyos Labs at MIT and will be launched soon. There are more effective technologies for transactions, including iris scanning, which will become more prevalent as businesses and consumers understand the risks associated with security based on fingerprints. Hoyos Labs operates at the Cambridge Innovation Center on MIT’s campus. The goal of the company is to develop and deploy enterprise and consumer Identity Assertion technology platforms that will conveniently and securely solve the identity challenges of today.