David Tayouri brings us the perspective of the Israeli defense environment, justly famous for its leadership in cybersecurity. For Tayouri, the combination of biometrics, asymmetric cryptography (think “PKI”), and blockchain can help construct a strong authentication and authorization environment, which is crucial to, in his words, “reconstruct virtual trust.”
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.
Member/Guest loginForgot your password?