Viewing posts from: November 2000
09Oct
12 Hurdles Hampering the Internet of Things
Uncategorized

IoT-Hurdles-e1414429382628

“The IoT will be a multi-trillion industry by 2020. For that forecast to materialize, some of that money will flow in the pockets of entrepreneurs who can clear the hurdles that threaten to rob the IoT from reaching its full potential.”

Read more: http://www.ciodashboard.com/internet-of-things-2/12-hurdles-hampering-the-internet-of-things/

Read More
29Aug
Department of Transportation V2V Study Released
Uncategorized

7099972US Department of Transportation releases report with findings from Safety Pilot for V2V conducted in 2012. Report is titled: “Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application.”

Report cites the lack of research into cyber-attacks, an area of concern for consumers:

  • “Senate Commerce Committee Chairman Jay Rockefeller asked, ‘As our cars become more connected — to the Internet, to wireless networks, with each other, and with our infrastructure — are they at risk of catastrophic cyber-attacks?’ To date, NHTSA’s V2V research has not included research specific to this issue…”
  • “The agency may also wish to explore the availability and appropriateness of measures to mitigate cyber-attack risks specific to V2V technologies (if any exist).”
  • “In the June 5, 2013, poll released by the Alliance mentioned above, it was also found that consumers, when questioned about self-driving vehicles, expressed concerns about cyber-security (i.e., 81 percent about a computer hacker controlling the car), companies collecting data from the self-driving cars (i.e., 75 percent), and companies sharing this information with the government (i.e., 70 percent).”
Read More
27Aug
JPMorgan and Other Banks Struck by Hackers
Uncategorized

7204091“A number of United States banks, including JPMorgan Chase and at least four others, were struck by hackers in a series of coordinated attacks this month…”

“The hackers infiltrated the networks of the banks, siphoning off gigabytes of data, including checking and savings account information, in what security experts described as a sophisticated cyberattack.”

Read more: http://www.nytimes.com/2014/08/28/technology/hackers-target-banks-including-jpmorgan.html

Read More
31Jul
Hackers can tap USB devices in new attacks
Uncategorized

“USB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potenti5151752al new class of attacks that evade all known security protections…”

Read more: http://www.reuters.com/article/2014/07/31/us-cybersecurity-usb-attack-idUSKBN0G00K420140731

Read More
07Jun
“Internet of Things: it’s all coming together for a tech revolution”
Uncategorized

2698194“For those unfamiliar with it, the Internet of Things (also known as M2M or machine to machine) refers to an expanding network of interconnected internet-enabled devices. Driven by miniaturisation, the affordability of components such as cheap Bluetooth sensors, and the growing ubiquity of technologies such as Wi-Fi, it is now possible to connect devices in a way that would never have previously been thought possible. While still in its “early adopter” infancy, some estimates suggest that by 2020 there will be in the region of 50bn IoT devices – all talking with one another on a constant basis.”

“What do you see being the big ethical questions involved with this?”
“Security is a big one.” – Ian Ferguson, vice president at ARM

Read more: http://www.theguardian.com/technology/2014/jun/08/internet-of-things-coming-together-tech-revolution

Read More
22May
“Cloud Computing, Nation-state Threats Redefining Enterprise Security, Panelists Say”
Uncategorized

MIT_Sloan_CIO_Security_Panel“Trying to control employees use of USB-equipped devices to transfer data is another ineffective security measure, Gilmore said. Identifying USB devices is challenging, he said, noting that the technology is found in common items like pens and watches. ‘Data is ubiquitous, easy to transfer,’ he said. ‘How do you keep them from using USB? You don’t.'”

Read more: http://www.cio.com/article/2376052/security0/iot-cloud-computing-nation-state-threats-redefining-enterprise-security-panelists-say.html

Read More
19May
US Charges Five Chinese Officers with Cyber-Espionage
Uncategorized

8997686“The US has charged five Chinese army officers with hacking into private-sector American companies in a bid for competitive advantage, in the first cyber-espionage case of its kind.”

Read more: http://www.bbc.com/news/world-us-canada-27475324

Read More
13May
MIT Sloan CIO Symposium
Uncategorized

7549298Upcoming event: May 21, 2014: MIT Sloan CIO Symposium
Highlighted Panel: Security and Privacy in the Digital Enterprise
Event Location: Kresge Little Theater
Event Time: 1:30PM – 2:30PM

Speakers:
Joseph Hadzima, SB ‘73, SM ‘77, Martin Trust Center for MIT Entrepreneurship (@JoeHadzima) – Moderator
Mark Morrison, State Street Corporation
Patrick Gilmore, Markley Group
Rob May, Backupify (@robmay)

MIT Sloan CIO Security and Privacy Panel Description:

Any digital enterprise must protect its own infrastructure and information against compromise. However, the “internet of everything”, mobile devices, cloud applications, and BYOD (bring your own device) are changing the stakes on what it means to be secure.  Is your enterprise prepared for the next generation of attacks, including low-level protocol attacks and APT (advanced persistent threat)? This panel will explore the implications of recent major compromises of the NSA and other private sector companies on the digital enterprise.  In addition, the panel will explore why CIOs need to constantly evaluate new technologies and put policies and procedures in place to combat against increasingly sophisticated cyber attacks.  Finally, the panel will explore the implications of introducing technology and policy changes on organization culture and budgets.

Read more: http://www.mitcio.com/

Read More
11Apr
“Heartbleed bug affects gadgets everywhere”
Uncategorized

5397162“The Internet bug Heartbleed doesn’t just affect websites. It also has shown up in the gadgets we use to connect to the Internet.”

CNN Money: “2014: The year of the mega breach”

Read more: http://money.cnn.com/2014/04/11/technology/security/heartbleed-gear/

Read More
06Mar
Target’s CIO departure highlights the new requirement of the CIO to focus on cyber security
Uncategorized

Target_Breach

“For a host of companies, the Target breach was a pivotal event that permanently altered the way they approach data security. Many CIOs say they’re receiving more support, but they say the trade-off is that they’re facing increased scrutiny from their CEOs and other executives. If their fortress walls fall to hackers, their jobs will be on the line.”

…”Getting on the cover of The Wall Street Journal in some cyberattack is a CIO’s worst nightmare,” he says. “They’re the bodyguard and the linchpins of the companies they work for more today than ever before, because of the amount of data that’s out there.”

…”I think CIOs are getting more respect,” Scannell says. “They’re winning a seat at the table. But along with that, we have a heightened security risk, so they’re under pressure to do something about it.”

Read more: http://www.utsandiego.com/news/2014/mar/05/target-execs-departure-puts-spotlight-on-cios/

Read More