Hector Hoyos the owner and founder of Hoyos Labsl joins Craig to discuss fingerprint identification systems, iris-based identity authentication, and interactive financial transaction systems. The iPhone 5S uses fingerprint technology to unlock devices, but fingerprints are not optimal for security, as they are easily replicated and have a high false-accept rate. To date, attempts to introduce fingerprints for secure access purposes have failed, which concerns business owners who foresee consumers using them to access confidential accounts. Hoyos Labs’ goal is to productize technologies like iris scanning and translate them into real-world solutions that solve identity challenges. There is a next-generation technology for mobile identification authentication that does not use, and is more effective than, fingerprints. It is currently being developed by Hoyos Labs at MIT and will be launched soon. There are more effective technologies for transactions, including iris scanning, which will become more prevalent as businesses and consumers understand the risks associated with security based on fingerprints. Hoyos Labs operates at the Cambridge Innovation Center on MIT’s campus. The goal of the company is to develop and deploy enterprise and consumer Identity Assertion technology platforms that will conveniently and securely solve the identity challenges of today.
Maria Paitchel the New England Market Director for Regus joins Craig to discuss the use of flexible workspaces. Regus enables people to work their way, whether it’s from home, on the road or from an office. Customers such as Google, GlaxoSmithKline, and Nokia join hundreds of thousands of growing small and medium businesses that benefit from outsourcing their office and workplace needs to Regus, allowing them to focus on their core activities. In the wake of NSA scandal, businesses are more aware of how easily sensitive company information can be leaked. Public settings such as coffee shops and hotel lobbies don’t provide a secure, professional work environment that is often needed. Employers are urging their employees to be mindful of their surroundings when working remotely. Regus has five tips on how you can protect your employers’ privacy while working remotely:
1.Never use the name of a company while making a phone call if you are not in complete privacy – use phrase like “our client” or “our customer”
2.Use a privacy screen on your laptop on long plane, train or bus trips so your traveling companions can’t see specifically what you are doing
3.When you are in the elevator at your company or a customer’s, never mention any person by name or the nature of your visit, even to a colleague traveling with you
4.Look for remote working options that allow you to speak behind closed doors, or not have to shout over the noise of music, road noise or espresso machines
5.If a topic or subject is strictly confidential and you are in public, don’t talk about work at all – how about those Patriots?
Jim Ivers the VP of Marketing at Covata joins Craig to discuss protecting sensitive data and intellectual property at the point of origination with the ability to define access controls and consistently modify those controls instantly as conditions evolve. The traditional data perimeter is outdated and has become an artifact of a simpler, dusty time thanks to megatrends like mobility, the cloud, and social media. And traditional data encryption practices are as dated as the perimeter. As a result, data encryption must evolve to address the realities of today. A broader view of data protection is required. Despite the outdated nature of traditional data encryption practices, Covata still believes that encryption is the right approach. Covata enterprise data protection provides the next step in data protection by combining encryption, control, and visibility. By protecting data at the point of origin, organizations can ensure their sensitive information is protected.
Brett Hartman the CTO of Security and Government Group at Cisco joins Craig to discuss BYOD. With more employees using personal mobile devices (e.g., smartphones, tablets, wearable devices) in the workplace, companies need to consider advanced security measures to ensure privacy for both individual and company data. Cisco Identity Services Engine (ISE) is a security policy management and control platform. It automates and simplifies access control and security compliance for wired, wireless, and VPN connectivity.
Cameron Camp a researcher at ESET joins Craig to discuss high-performing security solutions for home users and corporate customers. ESET advanced security solutions are trusted by businesses and consumers around the world for protection against today’s most sophisticated cyber attacks. On a daily basis, ESET protects millions of users across all types of environments – be it computers, laptops, mobile devices or servers. ESET Endpoint Security and ESET Endpoint Antivirus, in addition to ESET NOD32 Antivirus, ESET Smart Security and ESET Cyber Security (solution for Mac), are trusted by millions of users globally and are among the most highly recommended security solutions in the world. With the number of cyber threats on social media sites like Facebook and
Twitter multiplying each week, ESET is on a mission to help consumers identify malicious cyber threats and protect their sensitive personal information from getting into the wrong hands.