Category: Blog

  • LastPass Breach Underscores Password Fragility and Value of MFA

    LastPass Breach Underscores Password Fragility and Value of MFA

    LastPass, a password manager, has suffered the latest in a series of successful breaches.  Password managers like LastPass, which attempt to create unique, complex passwords for many different accounts, which are then stored behind an encrypted master password in a “vault,” are seen as the response to the multitude of credentials we now need across the modern…

  • NIST Post-Quantum Encryption Candidate Foiled by Classical Computing

    Many are familiar with the progress being made towards the next generation of computing: quantum computing. While quantum computing promises to revolutionize the entire world and provide a wealth of innovations and advancements in our industry, it also comes with significant challenges. One of the most salient and immediate concerns is its ability to break…

  • Deep Learning AI Improves Facial Movement Tracking

    A growing area of research in mobile data collection is the real-time tracking and communication of facial movements. While this presents another opportunity for human progress through data, it also raises technological challenges and serious privacy concerns.  Research in this area has faced a variety of barriers. Potential solutions have been too physically cumbersome, too…

  • Use Retraction Watch to Keep Tabs on Bogus “Hijacked” Journals

    As a research institution, we know the value of credible, peer- reviewed journals. To cite and be cited is the lifeblood of modern academic discourse. But how do you know if a journal is what it purports to be? As reported recently in Nature, the project Retraction Watch, can allow researchers to find out before they submit if a…