RKVST

Cambridge, UK
2018
  |  By Colin McCabe
In the age of Gen AI, it is now apparent that we can no longer trust what we see and read. The fakers have the upper hand: while typical security approaches rely on scaling up teams, attacks scale at the press of a button. To safely move forward and realize the benefits Gen AI enables, we need a better trust model that adds integrity, transparency and trust to all data and a common provenance format that captures origin, authenticity and lineage information. We must verify data before we use it.
  |  By Colin McCabe
DataTrails enables compliance and audit teams to eliminate the time-wasting and error-prone processes with our new solution. With the introduction of our Dropbox connector, there is a no-code solution that provides notarized evidence of your file’s metadata. Now you can capture legally admissible proof for your business with just a few clicks. To get started, set-up a free DataTrails account and connect it to Dropbox by following these instructions.
  |  By Jon Geater
We’ve listened, we’ve learned, and the market has definitely spoken! Our old name just wasn’t working: it was hard to pronounce, hard to spell, and hard to understand what we do. Even if the ‘archivist’ leap was made it didn’t carry our special mission with it.
  |  By Jon Geater
One of my favourite tools for playing with REST APIs is, of course, Postman. It can make interacting with DataTrails super quick and easy, and help you develop custom workflows for storing and validating your digital provenance and audit trails. Here’s a step-by-step guide to getting a robust Postman set-up configured, and if you head over the Postman public collections you’ll find a link to a pre-baked DataTrails Postman collection with this done for you, along with some example requests.
  |  By Rusty Cumpston
We are thrilled to announce a new integration with Dropbox that enables verifiable provenance metadata to be automatically created for content you store and manage on Dropbox. With the onset of generative AI and the increasing threats of fake data and fraud, the ability to prove ownership of your content and protect it from misuse is more urgent now than ever.
  |  By RKVST
Artificial Intelligence (AI) has emerged as a transformative force, reshaping industries, societies, and the way we live and work. The profound impact of AI is evident in virtually every facet of our lives, from personalized recommendations on streaming platforms to the automation of complex tasks in many industries. Join us on this data-driven journey to unravel the multifaceted world of AI and explore the numbers that underpin its significance in our rapidly evolving digital era.
  |  By Colin McCabe
The other week in San Francisco at IETF117, a group of developers and subject matter experts gathered to do just that. The IETF mission is: “To make the internet work better by producing high quality, relevant technical documents that influence the way people design, use, and manage the internet.” This standards body is quite unique – anyone with the right passion can join. Believe it or not, humming is a measure of consensus.
  |  By Will Cumpston
Last month, Adobe’s Chief Trust Officer Dana Rao testified to Congress about the importance of content provenance, encouraging Congress to require platforms to maintain proof of origin for content, ensuring that “attributions are not stripped away, and artists can receive credit for their work.” Following Rao’s testimony, Google, Microsoft, Amazon, and other AI leaders met at the White House to voluntarily agree to “ Develop and deploy mechanisms that enable users to under
  |  By Rusty Cumpston
Last week, the godfather of AI, Geoffrey Hinton smashed the glass and activated the big red AI alarm button warning all of us about creating a world where we won’t “be able to know what is true anymore”. What’s happening now with everything AI makes all the other tech revolutions of the past 40 plus years seem almost trivial.
  |  By Liz Harris
It’s April, designated National Supply Chain Integrity month by CISA, NCSC, ONCD and Department of Defense, to promote resources, tools, and information to help organizations and agencies secure their supply chains and build resilience. But what role does blockchain play in supply chain and how easy is it to implement? Blockchain technology has numerous potential applications in supply chain due to its ability to provide a secure, transparent, and tamper-proof ledger of transactions.
  |  By RKVST
We've listened, we've learned, and the market has definitely spoken! Our old name just wasn't working: it was hard to pronounce, hard to spell, and hard to understand what we do. Even if the ‘archivist' leap was made it didn't carry our special mission with it. At the same time, our customers are increasingly telling us that what we do best is help them build immutable audit trails for all their business data: documents, files, images and other types of digital content.
  |  By RKVST
Bring provenance to your Dropbox files with RKVST. How can you prove that your work is original, authentic, and trustworthy? How can you protect it from being copied, manipulated, or misused? That’s where RKVST comes in, documenting the origin, history, and validity of your content, such as text, images, audio, or video, so you can prove where it came from. With RKVST you can: And with RKVST for Dropbox creating and recording the provenance metadata is as easy as a click of a button. Watch our video to find out how.
  |  By RKVST
Bring provenance to your Dropbox files with RKVST. How can you prove that your work is original, authentic, and trustworthy? How can you protect it from being copied, manipulated, or misused? That’s where RKVST comes in, documenting the origin, history, and validity of your content, such as text, images, audio, or video, so you can prove where it came from. With RKVST you can: And with RKVST for Dropbox creating and recording the provenance metadata is as easy as a click of a button. Watch our video to find out how.
  |  By RKVST
Delve deep into Cyber Resilience with RKVST in just under a minute! This short clip demystifies Cyber Security, emphasizing the real needs of businesses - resilience and security that supports operational objectives. 🌐 Quick Insights: Understanding Cyber Security beyond 'buying one security' Unpacking the essence of business resilience with RKVST.
  |  By RKVST
Spot fake content and data with RKVST's Instaproof.
  |  By RKVST
🛑 Why is this important? With growing #mistrust in online #content , having transparent and #verifiable sources is key to building a more honest and accountable digital world.
  |  By RKVST
RKVST can add long-term provenance and data tracking to any C2PA asset, including external manifests! In this video, Will provides a quick demo showing the process of uploading and combining assets with external manifests that provide the instant proof needed to verify and decide if digital content is trustworthy.
  |  By RKVST
Mitigate insider threats with RKVST. This demo is an example of how with RKVST it's quick and simple to identify who did what when to any asset so you can quickly see if there has been any malicious activity, when it happened and who was responsible. RKVST provenance-as-a-service enables organizations to authenticate data and build trustworthy digital supply chains. It also makes it quick and easy to locate an asset.
  |  By RKVST
Will demonstrates how easy it is to use RKVST Instaproof to verify the authenticity of a document. With Instaproof, you can drag and drop any file to instantly verify its origin, so you can make informed decisions about whether to trust it or not. Instaproof is perfect for anyone that wants to ensure the authenticity and provenance of their data, whether it's for regulatory compliance, intellectual property protection, or just good business practice.
  |  By RKVST
Will demonstrates how easy it is to use RKVST Instaproof to add provenance to your data and share portable provenance records with customers, partners and suppliers.

RKVST is a service for developers to continuously prove who did what when which brings confidence in critical business decisions.

RKVST’s Zero Trust Fabric approach empowers enterprises with the benefits of DLT and trustworthy supply chain visibility through a simple agentless API that integrates easily with existing software, systems, and security policies, enabling you to continuously verify then trust data that originates outside your domain of control before making critical decisions.

Key Features:

  • Provenance: Proof of origin and life history. Continuously capture the full lineage and pedigree of assets. Help your users identify the who, what, and when of ownership, maintenance, audits, and change approval for critical assets.
  • Governance: Producers can precisely control information flows to the right users at the right time – inside and outside your organization. Put your business users in control of sharing policies.
  • Immutability: An unbreakable chain of evidence is preserved for all stakeholders. Continuous assurance and reliable access to data enables faster, more confident critical decisions.

If you rely on shared data with your supply chain partners you need a zero trust fabric.