data protection

April 1, 2018
By Andy Cohen and Maj. James Twist, USA

Jack Finney’s science fiction classic Invasion of the Body Snatchers offered a frightening premise. In the novel, aliens in seed vessels descend to Earth, landing in a small California farming community. As the townsfolk sleep, these seeds replicate the earthlings and, by morning, replace them. The only discernible difference between the clones and their host bodies is that the clones lack emotion. In essence, the aliens have stolen the earthlings’ DNA, and the humans never saw it coming.

The idea of this happening is unimaginable—in the case of human bodies at least. However, one company replacing another company’s DNA then killing off the original entity is happening now in the invisible world of cyber.

September 29, 2015
By Justin Marston
Derived credentials are the latest attempt to address the challenge of mobile authentication.

One ring to rule them all,
One ring to find them,
One ring to bring them all,
And in the darkness bind them. –
J.R.R. Tolkien, The Lord of the Rings

If you are not a fan of The Lord of the Rings, the executive summary is that you can simplify life and improve security for derived credentials if you only distribute one authorized credential, used by a thin client to access a centralized virtual operating system that holds all the other keys. For those with an appetite for a mystical romp through Middle Earth involving magical keys and rings, I suggest you place your tongue firmly in cheek and proceed.

June 11, 2010
By Henry Kenyon

The roots of the Army's Research and Technology Protection Center (ARTPC) don't date back to Shakespearean times, but the center's genesis took place early in the 21st century with the original mission of protecting technologies of the now-canceled Future Combat Systems program.