, , , , , , ,

Biometric Authentication News – Podcast – 47

 

Release Date: 2018-02-09 Episode #47



Interview with Scott Rose, Computer Scientist, NIST talking about Email Trust and SP1800-6 Guide



George Avetisov, CEO of HYPR talking about Authentication Landscape

  • The RELX Group announced that it would acquire ThreatMetrix for £580 million (about $817 million) in cash.
  • The Balancing Act of Account Opening in the Online Gaming Industry a new report from identity verification expert Jumio
  • Nuance announced that its voice biometrics solution has hit a milestone
  • BNSF Railway has become the latest member of the Blockchain in Transport Alliance (BiTA).
  • Singapore Airlines (SIA) plans to launch a blockchain-based loyalty scheme for frequent fliers in a bid to deepen retail relationships.
  • ATM skimmers are proliferating
  • Center for Humane Technology (CHT). A group launched a new campaign to protect young minds from what they say is “the potential of digital manipulation and addiction.”

, , , , , , ,

Biometric Authentication News Episode #47 Date: 2018-02-09 – Episode #47


  • The RELX Group announced that it would acquire ThreatMetrix for £580 million (about $817 million) in cash.
  • The Balancing Act of Account Opening in the Online Gaming Industry a new report from identity verification expert Jumio
  • Interview with Scott Rose, Computer Scientist, NIST talking about Email Trust and SP1800-6 Guide
  • Nuance announced that its voice biometrics solution has hit a milestone
  • George Avetisov, CEO of HYPR talking about Authentication Landscape
  • BNSF Railway has become the latest member of the Blockchain in Transport Alliance (BiTA).
  • Singapore Airlines (SIA) plans to launch a blockchain-based loyalty scheme for frequent fliers in a bid to deepen retail relationships.
  • ATM skimmers are proliferating
  • Center for Humane Technology (CHT). A group launched a new campaign to protect young minds from what they say is “the potential of digital manipulation and addiction.”

, ,

Michael De Pasquale of BIO-Key talks about TouchLock Padlocks

Michael De Pasquale talks about a solution to “Where are my Keys?”

BIO-Key introduced TouchLock Padlocks at CES-2018 and we have that covered on our show

Authentication : What is a bastion host?

A bastion host is a special purpose computer on a network specifically designed and configured to withstand attacks. The computer generally hosts a single application, for example a proxy server, and all other services are removed or limited to reduce the threat to the computer. It is hardened in this manner primarily due to its location and purpose, which is either on the outside of a firewall or in a demilitarized zone (DMZ) and usually involves access from untrusted networks or computers.

A bastion host is a computer that is fully exposed to attack.

The firewalls and routers can be considered bastion hosts.

These are several examples of bastion host systems/services:

  • DNS (Domain Name System) server
  • Email server
  • FTP (File Transfer Protocol) server
  • Honeypot
  • Proxy server
  • VPN (Virtual Private Network) server
  • Web server

There are two common network configurations that include bastion hosts and their placement.

  1. requires two firewalls, with bastion hosts sitting between the first “outside world” firewall, and an inside firewall, in a DMZ
  2. only one firewall exists in a network, bastion hosts are commonly placed outside the firewall

 

Source https://en.wikipedia.org/wiki/Bastion_host