AST Digital Magazine FINAL (2.5.16) Feb 2016 | Page 6
1
2
Volume 1
February 2016
"This research will focus on enabling highly secure, highly efficient
techniques that meet real-world applications and are most relevant to the
Department of Defense in defending programs against reverse
engineering attacks," said Steven Omick, Ph. D., president of Vencore
Labs. "This work builds on our expertise in cyber security and applied
research can help our customer stay ahead of the technological curve in
defending against those types of attacks."
Vencore Labs will team with New Jersey Institute of Technology and BBN
Technologies. Specifically, the team will leverage its prior work on efficient
protocols for privacy-preserving computation and homomorphic
encryption completed under DARPA's Programming Computation on
Encrypted Data (PROCEED) program and the Intelligence Advanced
Research Projects Activity (IARPA) Security and Privacy Assurance
Research (SPAR) program.
Abo ut Ve nc ore, Inc.
Vencore is a proven provider of information solutions, engineering and
analytics for the U.S. Government. With more than 40 years of experience
working in the defense, civilian and intelligence communities, Vencore and
its transformational applied research organization, Vencore Labs, design,
develop and deliver high impact, mission-critical services and solutions to
overcome its customers most complex problems.
Vencore, the 2014 recipient of the Northern Virginia Technology Council's
Tech Company of the Year Award, has 4,000 employees and is based in
Chantilly, Va. For more information about Vencore and Vencore Labs, visit
www.vencore.com and http://www.vencorelabs.com.
HID Global Looks Ahead at Top Trends
for Secure Identity in 2016
News Highlights:
• Mobility and a growing focus on the user experience will be a strong
focus for organizations in 2016.
• Trusted digital identities will proliferate across increasingly connected
environments for greater convenience, fueling opportunities to
enhance productivity and drive compliance to security policies.
• Privacy protection will continue to grow in importance, forcing
organizations to improve best practices for preventing breaches and
safeguarding identities, even after they’re stolen.
HID Global®, a worldwide leader in secure identity solutions, has
identified security 2016 trends to watch based on its deep insights gained
from top customers across numerous markets, along with pilots and
deployments of the company’s latest solutions with forward-looking
partners and end-user organizations worldwide. HID Global’s broad
industry perspective has positioned the company to pinpoint five key
developments that it believes will have the greatest impact during this
year on identity and access management, citizen identification and the
Internet of Things (IoT).
“We’re watching several developing trends in the new year, including
growing demand for a more mobile-centric and satisfying user experience
that HID Global believes will be the primary driver for security technology
innovation in 2016,” said Stefan Widing, HID Global President and
CEO. “Customers will increasingly aspire to a comprehensive secure
identity experience for their users that can provide the foundation for
more flexible, adaptable solutions in a new era of interconnected
digital identities and the Internet of Things.”
HID Global’s 2016 trends point to a more mobile and connected
experience, ongoing advancements in privacy protection and broader
adoption of best practices for solution deployment. The trends
include:
• Trend #1: “Mobilizing” security will make it more pervasive and
personalized: a new, more secure identity lifestyle will be built
around the convenience of ever-present mobile devices. Computer
and network logon, driver licenses and other applications will more
seamlessly join physical security functions on phones, tablets and
laptops. Wearables will be the next step, and phones will also work
with RFID tags to add security and trust to the IoT for proof-ofpresence applications.
• Trend #2: Security will move to a much greater focus on the user
experience: This will help close the gap between planning and
compliance, while ensuring that security adapts to rather than
defines end-user habits and lifestyles. Old ways of authenticating
will be replaced by more satisfying alternatives.
• Trend #3: Secure, connected identities will fuel safety and
innovation in how we work, shop and play: The industry will enter its
next new chapter of connected identities, employing multi-layered
security strategies that also include biometrics in order to bind
these identities to their legitimate owners.
• Trend #4: There will be more attention on privacy in an
increasingly connected and mobile-first world: Identity will expand
beyond people and their personal identity to the identity of objects
and their authenticity, accentuating the need to protect personal
information across increasingly interconnected devices, services
and applications.
• Trend #5: Security policies and best practices will become as
important as technology advances: The industry will sharpen its
6