Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being.
AI will encroach further into tasks previously done by humans. That is certain. It will do so not only in mundane, repetitive work, but also in highly specialized knowledge skills. The key to thriving in an AI-enabled environment is for leaders to grow in the human qualities AI can only mimic and not master. Motivating, mentoring, creativity, empathy and making genuine human connections with others – no matter their background – will be sorely needed to complement the computational and efficiency advancements AI will bring.
Stuxnet was the first true cyber-kinetic weapon, designed to cripple the Iranian – and perhaps also the North Korean – nuclear weapon programs. It succeeded in slowing the Iranian program, although it was discovered before it could deal the program a fatal blow. Its significance goes far beyond what it did. It marks a clear turning point in the military history and in cybersecurity. Its developers hoped for a weapon that could destroy strategic targets without civilian damage possible in traditional warfare. Instead, it opened the door to cyberattacks that can deliver widespread disruption to the very civilian populations it was designed to protect. Stuxnet has, years ago, disappeared from the digital world. Its unintended release beyond its target, though, made its code readily available to other nations, cybercriminals and terrorist groups, providing them with a wealth of advanced techniques to incorporate into their own malicious cyber efforts. Its impact on the future cannot overstated.
Technologies that could change the world have been a popular topic for the past half century. True, the predictions that everyone would drive flying cars have not materialized, but what has materialized would astound those who offered such predictions 50 years ago. And where emerging technologies are headed is even more stunning. Seven technologies, in my opinion, are poised for explosive growth in 2018. And what they can accomplish this year and beyond is not even the most significant disruption that I see them causing.
Digitization will continue to grow in the maritime industry and, with it, the threat of cyberattacks. The industry’s historic willingness to accept the risks that the open seas offer and meet them head-on when they occur should not also be its approach to cybersecurity. The stakes are high, with attackers employing increasingly ingenious strategies to achieve massive paydays from the vessels – and their companies – that leave unneeded vulnerabilities open to them. And not only are massive amounts of money at state, but also people’s lives and well-being. As digitization of the maritime industry grows, attention to cybersecurity must grow with it.
The inherent threat the evolution of our living places - Our species has moved out of the trees onto the savanna – just to build concrete trees instead, in the form of cities. Although this may be a nutshell view of human history, the movement towards making our living places habitable is taking a new turn. We no longer live just in the physical world, we now live also in the cyber-physical, and this transforms how we live, work, and play in the form of the ‘smart city’ built on our own data.
As physical objects and processes are increasingly being monitored or controlled by connected computational devices such as Industrial Control Systems (ICS) or Internet of Things (IoT), those physical objects and processes become hackable in the same way as the embedded devices controlling them. Ignoring the reality of vulnerabilities will not restrict them to the realm of fiction. The threats are real. Many have already occurred. Only by recognizing the new challenges that our connected world poses and coming together to address them will we be able to make our leap into this new way of life secure and safe, and get the fullest benefits from it.
AI's effect on the workplace will not be limited merely to repetitive, production line-type jobs. Increasingly, it also enters the realm of highly trained knowledge workers. It will also affect those who manage workers currently employed in such jobs. AI likely will reshape jobs all the way up to the C-level offices. That doesn't mean, though, that managers and executives will no longer be needed. They simply need to prepare themselves for shifts in their work responsibilities.
Where AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how we should prepare for it are some of the hottest topics being discussed today. Perhaps the most striking thing about these discussions is how different people’s conclusions are.
Personal privacy is something that once lost, may be difficult to pull back. If we have innocently signed away our data privacy rights because of trust in the status quo, there are no guarantees that our personal data will not be used against ourselves or our family members. The smart city train has already left the station. In a world where the population is increasing and resources are finite, we need to find smarter ways of living together. Smart technologies hold the key to making this happen but we need to proceed with caution and build a layer of respectful trust and privacy in our smart places.
The phrase 'smart city' conjures up a vision of a Metropolis like urban jungle. A jungle that is made up of intelligent structures, buildings that know when we enter and leave, traffic that flows easily, and always available parking spaces. A place where the city knows what we want, before we want it, and gets it right every time. This utopian vision of a future is actually fast becoming a reality… But as this brave new world opens up opportunities for business, it also reveals vulnerabilities for the individuals within the smart city too, including their own personal privacy. The smart city is built not only on traditional bricks and mortar but on data too. These data are integral to both the intelligence behind the smart city and our own place in an increasingly digital world. Privacy is one of those things that once lost, is difficult to regain. Are our smart cities leaders taking care, not just to provide efficient, clean living, but to take care of our privacy too?
"We're building a robot the size of the world, and most people don't even realize it." This is how Bruce Schneier described the Internet of Things in a nutshell… The "things" in our Internet of Things are frighteningly exposed… So, why isn't there more discussion about IoT hacks outside of the cybersecurity community? While the headlines are dominated by news of cyberattacks on retailers, there’s been surprisingly little buzz about this huge threat to what’s increasingly becoming the Internet of Everything… Why doesn't a government somewhere evaluate these frameworks, consult with experts, and draft regulations? If there's one thing everyone agrees on, it's the need for some sort of global standard to adopt. Ideally, industry leaders will come together to create the framework our growing internet of things desperately needs. The successful development and adoption of this network depends on it.
Telecom operators sat back as the new over-the-top (OTT) service providers, internet and tech companies slowly ate away at their business, particularly in the B2C space. A combination of institutional laziness and poor execution on promising initiatives gave these new entrants the time to jump in and snatch away customers…Telecom operators have an opportunity to rethink their business model, transform their organization, and execute on competitive ideas. This is especially true in the B2B space where telecom operators can use their existing infrastructure to offer premium network solutions for large enterprises, particularly when it comes to the Internet of Things (IoT)…Telecom operators are close enough to take a bite out of the IoT market. What they’re missing are the teeth and the determination. While the legacy tools and procedures exist to allow telecom operators to be the leading providers of IoT services and security solutions, it will take an organizational shift to make such a strategy successful. By doing this, telecom operators will not only make money, they’ll secure their future in the presence of ambitious OTT competitors.
In the 60s cartoon The Jetsons, the family lived in a futuristic city with flying cars, a robotic housekeeper, and even a watch that let you do video calling. The Jetsons city of the future is with us in the here and now as we have the technology to build smart cities, and in doing so, we can create amazing places to live and work. This idea of making our cities smart is engaging clever minds all over the world and we are witnessing the emergence of smart places across the globe. All of the visions of smart city projects have one thing in common. They are based upon the creation of, analysis of, and processing of, large amounts of data — aka integrated data exchanges, all predicated on hyper-connectivity achieved often through Internet-enabled devices. These data are the sights and sounds of the processes we use to live and work in municipalities…
The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing diversity often engenders frustration in those tasked with accomplishing it, and inspires eye rolls among diversity-fatigued employees who have heard countless reports on management’s diversity goals, but remain unconvinced of diversity’s value. Can anything be done to make diversity less of an uncomfortable topic? The answer is no. Nothing about diversity will ever make it into the general business population’s comfort zone. I say that not out of cynicism, but out of practicality. At its root, diversity is uncomfortable. But, surprisingly, the discomfort it creates is what makes it so valuable…
The global financial services sector is accelerating its transformation in response to changing values and shifting consumer preferences… A new breed of financial technology companies, known as FinTech, has emerged. FinTech has taken advantage of these changing preferences and advances in technology to innovate and to try and disintermediate incumbent providers by developing alternative platforms for financial activities. FinTech-driven disruption in financial services has been brewing for a while and it looks like 2017 will be the year the disruption becomes tangible… Hong Kong, with its position as a global financial centre and with its own rapidly growing millennial workforce, is starting to take the fight for its FinTech future seriously. PwC’s 2nd Global FinTech Survey shows that the vast majority of financial institutions in Hong Kong have decided on their FinTech strategy and kick-started a number of initiatives. While the degree of interest in FinTech is unmistakable, Hong Kong is approaching it in its own way…
(This is the draft second chapter of my upcoming book Cyber-Kinetic Attacks) The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many, for various reasons, aren’t even reported to agencies charged with combatting them. This hinders security experts in understanding the full scope and recognizing the trends in this growing problem. We’ll highlight examples of cyber-kinetic incidents and attacks in this chapter. Some were malfunctions that, nonetheless, demonstrated cyber-physical system vulnerabilities. Some were collateral damage from hacking or computer viruses. The vulnerabilities these exposed inspired a growing number of targeted cyber-kinetic attacks in recent years. If nothing else, the attacks described in this chapter demonstrate that the threat of cyberattacks on critical systems are not hypothetical. They occur increasingly...
Below is a timeline of over 50 historic cyber-kinetic attacks, system malfunctions and key researcher demos targeting cyber-physical systems (CPS), Internet of Things (IoT) and Industrial Control Systems (ICS) resulting in kinetic impacts in the physical world. I tried to select only those that were first-of-the-kind or that significantly increased general awareness about a particular type of an attack or incident.
(This is the first chapter of my upcoming book Cyber-Kinetic Attacks) We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities. Physical objects are so interconnected that we simply take those connections for granted, as if being able to unlock your car by pushing a button on your key fob, unlocking it with your phone or even by walking toward it is the way car locks always worked. This interconnectedness offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being.
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much more complex than such broad-brush claims suggest. Few Westerners realize that China and its neighbours in the Greater China region (Taiwan, Macau and Hong Kong) have, over last few years, became the most technologically advanced region in the world – ahead of the West in the adoption, and in many cases even in the development of advanced technologies. Countries in the region were always close to the top of the list of victims of cyberattacks. Factors, such as internal hacktivism and cybercrime perpetrated by the rapidly growing technologically savvy segment of the population and their legion of wannabe hacker apprentices have propelled cyberattacks on the region firmly to the top of that list. Rapid adoption of new technologies without adequately addressing cybersecurity issues only exacerbates the problem. The Greater China region has adopted these technologies aggressively. Yet, in their rush to adoption, enterprises in the region have largely lagged the rest of the world in addressing cybersecurity.

INDUSTRY NEWS

Why governments must take the lead on IoT security frameworks

Why governments must take the lead on IoT security frameworks

In my latest opinion piece on IoT Agenda “Why governments must take the lead on IoT security frameworks” I argue that there needs to be more government involvement when it comes to IoT security. At least until the industry more broadly accepts that IoT security, if done right, can become a competitive advantage and even speed up innovation.

Defeating 21st Century pirates: the maritime industry and cyberattacks

My article "Defeating 21st Century pirates: the maritime industry and cyberattacks" was published on CSO Online. From the article: Digitization in the maritime industry is growing, and cyberattacks are growing along with it. Attackers achieve massive paydays when maritime targets leave vulnerabilities open. If the maritime industry is to enjoy the potential that digitization can bring, it must put cybersecurity in the forefront instead of on the back burner.
Cyber Kinetic Threat

The tangible threat of cyber-kinetic attacks

My article "The tangible threat of cyber-kinetic attacks" was published on CSO Online. Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being.
Smart Future and Cyber-Kinetic Threat

Our smart future and the threat of cyber-kinetic attacks

My article "Our smart future and the threat of cyber-kinetic attacks" is published on HelpNetSecurity. Like most of my writing, the article focuses on cyber-kinetic threats of industrial control systems and how the rapid adoption of IoT keeps exponentially increasing the threat.
Protecting smart technologies and IoT from cyber-kinetic attacks

Protecting smart technologies and IoT from cyber-kinetic attacks

My article "Protecting smart technologies and IoT from cyber-kinetic attacks" is published on IoT Agenda. The article highlights the cyber-kinetic threats of the IoT. From the article intro: "Making physical objects or systems “smart” is all the rage today. Terms like smart houses, smart cars, smart cities, smart grids, smart refrigerators and even smart hairbrushes pop up everywhere. But there’s something not smart in the way this trend is progressing. Securing smart systems is being often overlooked."

Report: CrowdStrike – 2017 Cyber Intrusion Services Casebook

Crowdstrike published its annual Cyber Intrusion Services Casebook. Drawn from 100 real-life client engagements, the report looks into ever-evolving attacker tactics, techniques and procedures (TTPs) and reveals emerging trends observed in attack behaviors, including the preferred tactics used by threat actors to gain entry to the targeted environment.
Honeywell Survey

New Survey: Honeywell – Putting Industrial Cyber Security at the Top of the CEO...

Honeywell released a new study "Putting Industrial Cyber Security at the Top of the CEO Agenda" showing industrial companies are not moving quickly to adopt cyber security measures to protect their data and operations, even as attacks have increased around the globe.
Privacy in Smart Cities

Privacy in Smart Cities by Smart City Hub

New article on Smart Cities and Privacy "Privacy in Smart Cities" published on Smart City Hub. From the article intro:"This morning I told my...
Blackberry Automotive Cybersecurity

Whitepaper: Blackberry – 7-pillar Recommendation for Automotive Cybersecurity

BlackBerry has published its recommended framework to protect cars from cybersecurity threats. According to BlackBerry, the real challenge is securing the supply chain manufacturing these smart vehicles. With so many actors in the supply chain space individually contributing hardware or software, there is a higher risk of one of them accidentally introducing something harmful or not fully securing a part, which could result in the entire vehicle being compromised. The whitepaper lays out seven crucial security recommendations to harden automobile electronics from cyber attacks.
Key Safety Challenges for IIoT

White Paper: Key Safety Challenges for the IIoT

Industrial Internet Consortium published a new white paper "Key Safety Challenges for the IIoT". The white paper addresses four key challenges in IIoT security and offers why other current safety frameworks are falling short, and recommends what can be done to further mitigate these challenges.
Wi-SUN Rise of IoT

New Report: Wi-SUN Alliance – The Rise of the Internet of Things

Wi-SUN Alliance just released results of a survey of 350 IT decision makers from firms in the U.S., UK, Sweden and Denmark that are already investing in at least one IoT project. Similarly to other IoT related surveys, this one confirms that the IoT security tops the list of major concerns for IoT adopters. IoT security is holding back nearly six in ten (59%) of the respondents.
Western European Cities Exposed

New Report: Cities Exposed in Shodan

Trend Micro released the latest in the series of Shodan-based security studies on exposed city cyber asset. Earlier this year they released the report on exposed US cities, and now they looked into Europe, looking not only at Western European capitals, but deeper into three of its largest countries – Germany, France, and the United Kingdom.
Discovering Consumer Attitudes Toward Connected Car Security

New Report: Discovering Consumer Attitudes Toward Connected Car Security

Thales conducted a survey of 1,000 consumers across the U.S. and UK. Few interesting findings: Ownership of internet-connected cars is on the rise. 28% in the U.S. (increased from 24% in 2016) and 18% in the UK. Due to the current threat landscape people are very worried about security...
The Inconvenient Truth about Smart Cities

Who will really benefit from the coming smart-city revolution?

Article "Who will really benefit from the coming smart-city revolution?" is published by the New Scientist From the intro: "We need assurances on privacy, security and...
Smart Cities do not mean the Death of Privacy

Smart Cities do not mean the Death of Privacy

"Smart Cities do not mean the Death of Privacy" article argues that the privacy problem regularly being discussed in the context of smart cities...
PwC IIoT Operational Reference Architecture

Whitepaper: PwC – The Role of the CIO in Integrating IIoT for ...

The Industrial Internet of Things (IIOT) promises to revolutionize industrial and manufacturing activities, and disrupt today's business models. The CIO’s role will touch various parts of their company more than ever, and they will also need to help their businesses operationalize rapid changes in business models, from products to services, cloud-based models, outsourced models, and others.
Smart cities might not be such a bright idea

Smart cities might not be such a bright idea

Financial Times published an opinion piece "Smart cities might not be such a bright idea" "Smart cities are being rolled out across the globe, particularly...
ENISA - Baseline Security Recommendations for IoT

New Report: ENISA – Baseline Security Recommendations for IoT

The study which is titled ‘Baseline Security Recommendations for Internet of Things in the context of critical information infrastructures’, aims to set the scene for IoT security in Europe. It serves as a reference point in this field and as a foundation for relevant forthcoming initiatives and developments.
Slaughterbots

Video: ‘Slaughterbots’ Video Depicts a Dystopian Future of Autonomous Killer Drones

Interesting short video depicting a very scary future in which swarms of killer microdrones are dispatched to kill political activists and US lawmakers. Armed with explosive charges, the palm-sized quadcopters use real-time data mining and artificial intelligence to find and kill their targets.
Why the Entire C-Suite Needs to Use the Same Metrics for Cyber Risk

Article: Why the Entire C-Suite Needs to Use the Same Metrics for Cyber Risk

Excellent article from Harvard Business Review. The author recognizes that the members of the C-suite often aren’t speaking the same language around cyber risk and that the reporting lines and silos are impacting the enterprise-wide communication and coordination required to address new cyber risks...
The Inconvenient Truth about Smart Cities

The Inconvenient Truth about Smart Cities

Scientific American published an article "The Inconvenient Truth about Smart Cities" - Plans for more wired, networked, connected urban areas face challenges if they...
Annual IIoT Maturity Survey

Survey: Annual IIoT maturity survey – Adoption of IIoT in manufacturing, oil and gas,...

The survey provides an overview of the current state of IIoT adoption and prevailing industry attitudes towards IIoT, solution deployment progress, motivating factors, business objectives, and technology investment projections.
ACLU - Making Smart Decisions About Smart Cities

Guide: ACLU – Making Smart Decisions About Smart Cities

ACLU just published a guide on Smart Cities. It looks at how to balance the innovation with privacy risks and features a number of real-life case studies. From the intro: "In some cases, technological solutions to urban issues can reflect or even exacerbate racial or economic inequality rather than allocate city resources and services fairly. Technologies that collect information about residents and visitors can generate and expose deeply personal information or even be repurposed to function as surveillance tools..."
State of IoT 2018

New Report: Cradlepoint State of IoT 2018

New Cradlepoint Business Intelligence Report reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organizations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.
Forrester and ForeScout Research on IoT and OT Security Challengese

New Report: Forrester and ForeScout Research on IoT and OT Security Challenges

ForeScout commissioned Forrester Consulting to see if organizations can adequately and accurately secure their networks with the rise of IoT-connected devices. The study sheds additional insight into this issue that may be surprising...

Article: Smart Cities May Be The Death of Privacy As We Know It

Always excellent website Futurism just published an article on Smart Cities and Privacy - "Smart Cities May Be The Death of Privacy As We...
2017 Smart Cities Index

EasyPark 2017 Smart Cities Index

2017 Smart City Index was published by the Swedish firm EasyPark, which provides smart parking solutions in 10 markets in Europe and Australia. Drawing...
Smart Cities- better for whom

Smart Cities: better for whom? by Privacy International

Privacy International published an article "Smart Cities: better for whom?". From the article: "Technology is often given as an answer when we are not sure...
Smart Cities Pose Privacy Risks and Other Problems, But that Doesn't Mean We Shouldn't Build Them

Smart Cities Pose Privacy Risks and Other Problems, But that Doesn’t Mean We Shouldn’t...

"Smart Cities Pose Privacy Risks and Other Problems, But that Doesn't Mean We Shouldn't Build Them" paper was published in the University of Missouri-Kansas...

Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities

An interesting article "Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities" was published as part of the "Special issue on...