Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Introducing DataTrails provenance automation for Dropbox files

We are thrilled to announce a new integration with Dropbox that enables verifiable provenance metadata to be automatically created for content you store and manage on Dropbox. With the onset of generative AI and the increasing threats of fake data and fraud, the ability to prove ownership of your content and protect it from misuse is more urgent now than ever.

90+ Artificial Intelligence statistics you need to know in 2023

Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries, societies, and the way we live and work. The profound impact of AI is evident in virtually every facet of our lives, from personalized recommendations on streaming platforms to the automation of complex tasks in many industries. Join us on this data-driven journey to unravel the multifaceted world of AI and explore the numbers that underpin its significance in our rapidly evolving digital era.

Creating a better internet at IETF117

The other week in San Francisco at IETF117, a group of developers and subject matter experts gathered to do just that. The IETF mission is: “To make the internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the internet.” This standards body is quite unique – anyone with the right passion can join. Believe it or not, humming is a measure of consensus.

C2PA, external manifests, and expanding content provenance

Last month, Adobe’s Chief Trust Officer Dana Rao testified to Congress about the importance of content provenance, encouraging Congress to require platforms to maintain proof of origin for content, ensuring that “attributions are not stripped away, and artists can receive credit for their work.” Following Rao’s testimony, Google, Microsoft, Amazon, and other AI leaders met at the White House to voluntarily agree to “ Develop and deploy mechanisms that enable users to under

In the age of AI, how do you know what data to trust?

Last week, the godfather of AI, Geoffrey Hinton smashed the glass and activated the big red AI alarm button warning all of us about creating a world where we won’t “be able to know what is true anymore”. What’s happening now with everything AI makes all the other tech revolutions of the past 40 plus years seem almost trivial.

Top 5 uses of blockchain in supply chain

It’s April, designated National Supply Chain Integrity month by CISA, NCSC, ONCD and Department of Defense, to promote resources, tools, and information to help organizations and agencies secure their supply chains and build resilience. But what role does blockchain play in supply chain and how easy is it to implement? Blockchain technology has numerous potential applications in supply chain due to its ability to provide a secure, transparent, and tamper-proof ledger of transactions.

Postman Configuration for RKVST

We’re very pleased with our Python SDK, Jupyter Notebooks, and our OpenAPI Developer Console but sometimes we all want a bit more fine control or command chaining than those can offer. One of my favourite tools for such situations is, of course, Postman. It can make interacting with RKVST super quick and easy, and help you develop custom workflows for storing and validating your digital evidence ledgers.

Tracking the transport of radioactive sources with blockchain

This week, Australian authorities recovered a tiny capsule, just 6mm x 8mm (0.24 x 0.31 inches) along a 900km section of Australia’s longest highway, the Great Northern Highway. The pea-sized capsule was a radiation gauge containing caesium-137, a radioactive material with a half-life of 30.05 years, that is used to measure the density and flow of materials in the mining, and oil and gas industries.