Quantcast
Channel: Information Privacy
Browsing latest articles
Browse All 34 View Live

Levels of Identity Discovery

Technical Paper Multiple applications within the government and the private sector require some level of knowledge of the individual they are interacting with to provide specialized services. This...

View Article



Better Tools to Manage Chronic Illness Can Improve Patient Outcomes

Project Story MITRE has created the healthAction Patient Toolkit to help people with chronic illnesses better track changes in their health, communicate with their providers, and increase treatment...

View Article

MITRE Technology Lets You Use Your Voice to Protect Mobile Devices

Project Story Voice authentication could become a safe way to ensure a mobile device is accessible only to its rightful owner—but hackers can still fool your phone. New MITRE software tells the...

View Article

Componentization of Security Principles

Technical Paper As desirable as it would be, there exists no control that could be turned to “Maximum Security” without affecting other factors such as cost or usability. In this paper, the authors...

View Article

Federal Big Data Summit: Summary and Way Forward

Technical Paper The Federal Big Data Summit took place in June 2014 in Washington, D.C. It began with sessions that allowed participants to discuss the government’s challenge areas in big data. This...

View Article


MITRE Intranet Still Making History 20 Years Later

Project Story On May 1, 1995, MITRE threw the switch on one of the very first corporate intranet sites. Two decades later, the MII is still fulfilling its mission to connect employees to the people...

View Article

A Public-Private Partnership Takes on Real-World Cybersecurity Issues

Project Story Protecting our nation's critical networks and data is the very definition of a team sport. That's why the government has created a center for collaboration where MITRE, the business...

View Article

An Ethical Framework for the Use of Consumer-Generated Data in Health Care

July 2019 MITRE researchers developed the framework as a decision-making tool that can help balance the desire of organizations to harness the power of consumer-generated health care data with the need...

View Article


MITRE’s Privacy Engineering Tools and Their Use in a Privacy Assessment...

November 2019 MITRE has worked for two decades to develop resources that weave privacy risk management into the enterprise. Our Privacy Engineering Capability has created a suite of tools for privacy...

View Article


Five Things to Know about AI, 5G, and the Great Power Competition

April 2020 Artificial intelligence. 5G. IoT. Huawei. Great power competition. Understanding them all can be confusing, particularly as claims for AI capabilities blend hype and reality. MITRE experts...

View Article

Telehealth Privacy and Security Tips for Healthcare Providers and Patients

July 2020 Healthcare providers are rapidly deploying remote or virtual healthcare services to sustain operations and care. Maintaining patient privacy and security is critical, and here are practical...

View Article

Experience-Based Recommendations for Face Recognition

August 2020 Face recognition is a complex technology that needs best practices and policies to ensure appropriate use, but those efforts are being hindered by inaccurate or biased statements. This...

View Article

Intelligence After Next: The Future of the IC Workplace

November 2020 The Intelligence Community (IC) is at a strategic decision point. The massive disruption from COVID-19 compels immediate action to break down entrenched IC barriers to working outside...

View Article


Deliver Uncompromised: Securing Critical Software Supply Chains

January 2021 In the wake of the SolarWinds software supply chain attack, MITRE experts propose the establishment of an end-to-end framework for software supply chain integrity. Technical Paper

View Article

Beyond SolarWinds: Principles for Securing Software Supply Chains

March 2021 Plugging individual vulnerabilities as they are identified is not a winning strategy against sophisticated nation-state actors. This paper lays out a new principles-based approach to secure...

View Article

Browsing latest articles
Browse All 34 View Live




Latest Images