Challenge–response authentication

OpSec Security launches OpSec® KeyCode, the first fully integrated authentication label featuring a holographically enhanced 2-factor digital identifier

Retrieved on: 
Thursday, June 10, 2021

OpSec KeyCode labels secure Digital Identity through two-factor authentication via a unique serial number along with a random three-letter suffix.

Key Points: 
  • OpSec KeyCode labels secure Digital Identity through two-factor authentication via a unique serial number along with a random three-letter suffix.
  • However, KeyCode transforms that random three letter authentication code into a 3-Channel Optically Variable Device (OVD), otherwise known as a hologram, to provide superior on-product brand authentication and irreplicable Digital Identity.
  • The challenges manufacturers face in securing Digital Identities have become more sophisticated, requiring an advanced solution to ensure product authentication.
  • OpSec KeyCode is an ideal solution for the most challenging applications, providing the highest level of security for product and supply chain authentication.

Kiwi.com algorithm system makes over 2 billion flight price checks per day to find best deals

Retrieved on: 
Wednesday, May 26, 2021

When the algorithm finds the cheapest routes, the user sees them on the website under a special section called " Deals ", currently available in beta version.

Key Points: 
  • When the algorithm finds the cheapest routes, the user sees them on the website under a special section called " Deals ", currently available in beta version.
  • "A lot of great deals are already out there the challenge is usually to find them.
  • "And, sticking with the easy to find, we've named it simply 'Deals' so you can find it really easily!
  • Kiwi.com uses its automated system to make over 2 billion price checks per day.

Milton Security Survey Reveals More Than 1 In 5 Organizations Still Using Insecure NTLMv1 - Susceptible to Malicious Attacks

Retrieved on: 
Monday, March 29, 2021

The results of this survey were surprising in that 23% of organizations surveyed still used the authentication protocol.

Key Points: 
  • The results of this survey were surprising in that 23% of organizations surveyed still used the authentication protocol.
  • Microsoft issued guidance to stop using this configuration in January of 2013 because of the critical vulnerability it poses.
  • Rather than sending an encrypted password, NTLMv1 asks the user to encrypt a challenge word with the same pattern used to encrypt their password.
  • Milton Security operates a 24*7*365 unique Extended Detection & Response/Managed Detection & Response (MxDR) service that provides Threat Hunting As A Service using customers' existing security infrastructure.

Safe-T & ImageWare Systems Introduce the First-Ever Biometric-Based Zero Trust Network Access Solution

Retrieved on: 
Tuesday, March 16, 2021

The joint solution between Safe-Ts ZoneZero and ImageWare Authenticate addresses all access challenges with a simple and secure ZTNA solution.

Key Points: 
  • The joint solution between Safe-Ts ZoneZero and ImageWare Authenticate addresses all access challenges with a simple and secure ZTNA solution.
  • Before granting access, the solution collects and matches biometrics, either in cloud or on-premises, to ensure the users true identity.
  • Our joint solution brings best-of-breed in Zero Trust and biometrics for unparalleled access management security for today's remote world.
  • Together, ImageWare Authenticate and Safe-T ZoneZero have established an unrivalled ZTNA solution, controlling who can have access to all corporate resources and how this access is granted.

SoLVBL Solutions Inc. Announces Filing of a Second U.S. Provisional Patent Application

Retrieved on: 
Tuesday, March 2, 2021

The application encompasses an adaption and optimization of a well-known and time-tested cryptographic algorithm, the algorithm has been adapted to reduce latency in data stream applications.

Key Points: 
  • The application encompasses an adaption and optimization of a well-known and time-tested cryptographic algorithm, the algorithm has been adapted to reduce latency in data stream applications.
  • Such functionality opens the door for verifiable data, whose proof of authenticity can be stored and, or, transmitted alongside the data itself.
  • The company also plans to file additional related patents, and to commercialize numerous solutions to the increasing threat of digital forgery.
  • "The filing of our second provisional patent application validates our intention to create innovative authentication solutions that are designed to prevent, and address security challenges faced by many companies," said CEO of SoLVBL Raymond Pomroy.

Nonprofit Healthcare Organization with a Global Workforce Simplifies Security and Access to Enterprise Applications with BIO-key

Retrieved on: 
Monday, September 14, 2020

PIH provides medical care and support in areas where the cost of healthcare is prohibitive to the community or geographic region.

Key Points: 
  • PIH provides medical care and support in areas where the cost of healthcare is prohibitive to the community or geographic region.
  • One of the primary challenges the PIH IT staff faced was managing password resets for a global userbase often located in remote areas.
  • "Deploying advanced access management capabilities to a remote global userbase comes with extraordinary challenges and requires a well-architected security product," stated Mark Cochran, President of PortalGuard.
  • BIO-key is revolutionizing authentication with biometric solutions that enable convenient and secure access to devices, information, applications, and high-value transactions.

iQIYI Launches iCartoonFace Challenge Together with IJCAI-PRICAI 2020

Retrieved on: 
Wednesday, April 15, 2020

The Challenge consists of two tracks - iCartoonFace Detection Challenge and iCartoonFace Recognition Challenge, and teams may choose to participate in one or both tracks.

Key Points: 
  • The Challenge consists of two tracks - iCartoonFace Detection Challenge and iCartoonFace Recognition Challenge, and teams may choose to participate in one or both tracks.
  • With the cartoon character recognition challenge, iQIYI is once again at the vanguard of technological innovation, spurring the exploration and application of cartoon character recognition.
  • To support contestants to train their algorithms models, iQIYI will provide them with iCartoonFace detection and recognition datasets.
  • The top three teams in each challenge track will be awarded a cash prize of US$4,000, US$2,000 and US$1,000 respectively.

Silverfort Joins RSA® Ready Technology Partner Program

Retrieved on: 
Wednesday, September 4, 2019

Silverfort , the provider of Next-Generation Authentication solutions, today announces interoperability between Silverforts agentless authentication platform and RSA SecurID Access (the RSA Multi-Factor Authentication solution).

Key Points: 
  • Silverfort , the provider of Next-Generation Authentication solutions, today announces interoperability between Silverforts agentless authentication platform and RSA SecurID Access (the RSA Multi-Factor Authentication solution).
  • The RSA Ready ecosystem and Silverfort together offer a powerful and unique solution that addresses fast growing security challenges in todays enterprises, said Hed Kovetz, CEO and Co-Founder of Silverfort.
  • RSA, a global cybersecurity leader delivering Business-Driven Security solutions to help organizations manage digital risk, through the RSA Ready program provides technology partners an opportunity to develop, certify and market solutions with RSA.
  • Together, Silverfort and the RSA Ready Partner Program will empower customers to focus on opportunities to transform their business while protecting their most valuable assets.