Is delivering a new security product like delivering a good wine?
April 27, 2020
What can we learn about introducing a new enterprise security product from looking at legacy products and different kinds of innovation? I wanted to jot down some quick thoughts from the startup world.
Tags: Business Strategy, Cybersecurity, Design Thinking
Telework Challenges in a Mobile Device World
March 17, 2020
The coronavirus pandemic is affecting all walks of life. Hospitals and medical professionals are on high alert. Schools are closing. Professional sports teams are playing in empty stadiums and, in some cases, not at all. Companies and governments are reviewing how to reduce health risks while maintaining productivity. An obvious response is to expand their telework programs for employees.
Tags: Mobility, Future of Work, Business Continuity
Golidlocks problem of mobile device security in organizations
October 28, 2019
The theme is trade-offs between usability of the device and security for confidential organizational data such as conversations, messages, documents, images, and locations.
Tags: Cybersecurity, Mobility
Securing Mobile Devices
Enterprise Tech Success
September 06, 2019
Article covers the wavetops of mobile device cybersecurity and privacy from three perspectives of increasing sensitivity to risk -- consumers, business, and government organizations.
Tags: Cybersecurity, Mobility, Supply Chain
Smartphones, execs, & travel overseas
July 09, 2019
Security precautions for enterprise mobile devices.
Tags: Cybersecurity, Risk Management
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
April 11, 2019
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System (GPS) location, speed, any rapid acceleration, hard braking, hard cornering, and collision detection. Fleets are often early adopters of ADAS (Advanced Driver Assistance Systems) features that promote safety. The unintended consequence of ADAS adoption however is that computers are at the controls.
Tags: Cybersecurity, Emerging Technology, Autonomous Vehicles
The Common Vulnerability That Fintech and Bananas Share
January 08, 2019
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others.
Tags: Autonomous Vehicles, Cybersecurity, Fintech
Data centers must look past perimeter security
Data Center Dynamics
August 10, 2018
While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention
Tags: Cloud, Cybersecurity, Emerging Technology, Data Center
Want to stop cyber attacks? Why are all of your executables the same?
May 14, 2018
Mirror, mirror on the wall
When I go to download my favorite app from the vendor’s website, or App Store, and click on the latest version, say 2018.101 for Mac, I get the same version and functionality as millions of other users.
Supply chain cyberattacks surging -- How can we prevent them?
April 02, 2018
Symantec's new "Internet Security Threat Report," shows a 200% increase in reported supply chain cyberattacks year on year [i]. A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For example, auto suppliers’ contribution to vehicle has increased from 56% in the 1980s to over 80% today. The supply chain issue is the same whether the organization is involved in automotive, critical infrastructure, Industrial Internet of Things (IIoT), medical devices, or national security.
Cybersecurity – a gating issue for safety in a connected and automated vehicle future
October 19, 2017
Connected, partially and fully automated vehicles hold the potential to transform our lives, making real smart cities and ushering in undreamed-of efficiencies in the transport of people and goods by land and in the futures, air, and even space. Where things go wrong, however, potential harms are much greater than those of historical data breaches around mobile devices, laptops, desktops and the cloud.
Tags: Autonomous Vehicles, Cybersecurity, Emerging Technology
Top 5 tips to mitigate phone and IoT device hacking in government and enterprise
October 17, 2017
There is a growing need for cybersecurity tools to be more effective and for coverage to extend beyond older infrastructures to cover mobile and Internet of Things (IoT) devices. Some of these tool vendors will be well-known veterans of the personal computer / data center era and others will be startups, springing up to cover gaps in the market. A recent report by Gartner quantifies the growing threat to mobile devices - “by 2019, mobile malware will amount to one-third of total malware reported in standard tests, up from 7.5% today” .
Tags: Cybersecurity, IoT, Data Center
Securing the Data Center on Wheels
August 24, 2017
Today’s connected car is not so much a smartphone on wheels; with so many microprocessors chatting with one another across and beyond the vehicle, it is now more aptly described as a data center on wheels.
Tags: Cybersecurity, Autonomous Vehicles, Data Center
Why try to defend against new cyber threats with only legacy technologies?
July 19, 2017
Cybersecurity has an asymmetry of economics - defenders must defend everything but attackers need find just one-way in … and it need not be one seen before. Attackers are updating methods more, attacking more and impacting more devices and people.
Wake up call of week's cyberattacks ... how to avoid more
May 15, 2017
The bad news is that the last week has seen an unprecedented number of ransomware attacks around the world which have hit some large organizations very hard.
The good news is that these particular attacks are entirely preventable with some easy short term steps, which are cornerstones of a larger cybersecurity strategy that can prevent others.