Hi, I’m Adil Sbaï. I am currently living in Paris, France. My interests range from technology to entrepreneurship. I am also interested in marketing and programming. Feel free to say hello through any of the social links below.
Some major players are showing an interest in behavioural biometrics “The technology profiles how a person interacts with a website on their mobile device by analysing their typing rhythm, how they hit and release the keys,” says Dr. Neil Costigan, CEO at Swedish IT and security company BehavioSec, which has a patented technology called BehavioAion that can be
What Are the Top 5G Security Challenges? As the world prepares for the first commercial debut of 5G networks, many people are curious about the security threats and risks that the new standard will face. 5G networks will support a massive number of connected devices, enable a huge increase of bandwidth, and create
We’ve already witnessed a massive evolution with mobile networks across the globe as 4G-LTE continues to expand. Mobile network operators, or MNOs, are now evolving these networks rapidly with an eye toward reaching 5G, but there remains a large gap in their security architectures that only widens as they add more bandwidth, lower network latency,
Recent pricing wars have seen major telco operators rush toward offering more appealing “unlimited” data packages, demonstrating that mobile data is the most important revenue asset at telcos’ fingertips.However, telcos must ensure they’re not solely focused on giving away big buckets of data – even if it’s an unlimited bucket, as this is not necessarily
Deep learning has revolutionized the world of artificial intelligence. But how much does it improve performance? How have computers gotten better at different tasks over time, since the rise of deep learning?In games, what the data seems to show is that exponential growth in data and computation power yields exponential improvements in raw performance. In
In the recent times, there have been lot of talks about Tokenization in Payments. Even though Tokenization has existed for quite sometime, it has gained traction only after the launch of Apple Pay. Android Pay and Samsung Pay are also using Tokenization to enhance payment security.I intend to explain what exactly is tokenization and how
Mastercard is almost ready to leave signatures behind. The company has announced that after April of next year, no signatures will be required for any debit or credit purchase in the US or Canada. Receipt signatures are already well on their way out the door, of course. Recognizing that they’re pretty much useless as a security tool
Robotics research has been making great strides in recent years, but there are still many hurdles to the machines becoming a ubiquitous presence in our lives. The journal Science Robotics has now identified 10 grand challenges the field will have to grapple with to make that a reality. Source: The 10 Grand Challenges Facing Robotics in
How do fingerprint and iris scanners work? And more importantly, which offers better security: biometrics or passwords? Apple’s Face ID is just one of many biometric authentication applications. Find out more about them, how they contribute to cybersecurity and what risks they pose. Source: Biometric Authentication Overview, Advantages & Disadvantages
Google and Facebook will be disrupted by the new European data protection rules that are due to apply in May 2018. This note explains how. Google and Facebook will be unable to use the personal data they hold for advertising purposes without user permission. This is an acute challenge because, contrary to what some commentators have assumed, they cannot use a “service-wide” opt-in for everything.