Categories: Podcast

Reinventing Identity and Access Management Based on Mathematical Principles from the Stars with Jonathan Nystrom

Reinventing Identity and Access Management Based on Mathematical Principles from the Stars with Jonathan Nystrom

Jonathan Nystrom is the CEO of Intensity Analytics, and this week’s guest. He joins Vince Walden to talk about his company’s program, TickStream, which uses astronomical principles to protect virtual identity. Identity is the bedrock on which virtually everything in our world operates, Jonathan says. It affects every facet of a company, and while the IT department plays a big role, it is management’s job to establish it. 

Jonathan Nystrom is the CEO of Intensity Analytics, and this week’s guest. He joins Vince Walden to talk about his company’s program, TickStream, which uses astronomical principles to protect virtual identity. Identity is the bedrock on which virtually everything in our world operates, Jonathan says. It affects every facet of a company, and while the IT department plays a big role, it is management’s job to establish it. How we protect identity today is a conglomeration of rules that our adversaries will learn to break if we continue to do things the same way.

There are 300 billion passwords currently in use and most of them have no protection in terms of multi-factor authentication. More than 80% of breaches occur as a result of stolen credentials. Intensity Analytics has developed a solution that enables systems to recognize you based on your unique password typing frequency. It is an added layer of authentication security that proves your identity rather than proving you possess access to your account. The algorithms were developed using insights from astronomy, and are now patented as a part of a core of the technology. It doesn’t even need to know your password, Jonathan says, just how you type it. Attempting to use other principles left it prey to a mathematical limitation called the Curse of Dimensionality, which comes up when comparing an infinite number of items to determine similarities.

This technology falls under the category of movement biometrics, which are more reliable than standard biometrics. Movement is being captured at a microscopic level, preventing the possibility of anyone else successfully impersonating you.

Resources

Jonathan Nystrom on LinkedIn | Twitter

IntensityAnalytics.com

Scott Mullins

Recent Posts

Decoding DOJ Directives: Navigating Compliance in Today’s Regulatory Landscape

Ensure compliance with DOJ expectations for your company. Learn about the importance of self-disclosure for…

3 days ago

Lessons from the Gunvor FCPA Enforcement Action

DOJ resolves Gunvor's FCPA case with $661M penalty. Insights highlight compliance efforts and expedited document…

2 weeks ago

Top Compliance Week 2024 Takeaways – konaAI

Compliance Week 2024 was recently concluded. It brought together some of the top compliance professionals…

2 weeks ago

Can generative AI give us prescriptive analytics?

One of four key types of analytics has long been considered a “pie-in-the-sky” concept for…

2 weeks ago

Lessons learned from the Trafigura FCPA Enforcement Action

Swiss trading firm Trafigura pleads guilty, settles $126 million fine for corrupt scheme following investigation…

3 weeks ago

KonaAI and Sandline Global Announce Strategic Partnership to Offer Industry-Leading Anti-Fraud, Anti-Corruption and Investigations Solutions

KonaAI, a leading provider of anti-corruption and compliance management solutions, and Sandline

4 weeks ago

This website uses cookies.