Home News Page 2

News

Blackberry Automotive Cybersecurity
BlackBerry has published its recommended framework to protect cars from cybersecurity threats. According to BlackBerry, the real challenge is securing the supply chain manufacturing these smart vehicles. With so many actors in the supply chain space individually contributing hardware or software, there is a higher risk of one of them accidentally introducing something harmful or not fully securing a part, which could result in the entire vehicle being compromised. The whitepaper lays out seven crucial security recommendations to harden automobile electronics from cyber attacks.
Key Safety Challenges for IIoT
Industrial Internet Consortium published a new white paper "Key Safety Challenges for the IIoT". The white paper addresses four key challenges in IIoT security and offers why other current safety frameworks are falling short, and recommends what can be done to further mitigate these challenges.
Wi-SUN Rise of IoT
Wi-SUN Alliance just released results of a survey of 350 IT decision makers from firms in the U.S., UK, Sweden and Denmark that are already investing in at least one IoT project. Similarly to other IoT related surveys, this one confirms that the IoT security tops the list of major concerns for IoT adopters. IoT security is holding back nearly six in ten (59%) of the respondents.
Western European Cities Exposed
Trend Micro released the latest in the series of Shodan-based security studies on exposed city cyber asset. Earlier this year they released the report on exposed US cities, and now they looked into Europe, looking not only at Western European capitals, but deeper into three of its largest countries – Germany, France, and the United Kingdom.
Discovering Consumer Attitudes Toward Connected Car Security
Thales conducted a survey of 1,000 consumers across the U.S. and UK. Few interesting findings: Ownership of internet-connected cars is on the rise. 28% in the U.S. (increased from 24% in 2016) and 18% in the UK. Due to the current threat landscape people are very worried about security...
The Inconvenient Truth about Smart Cities
Article "Who will really benefit from the coming smart-city revolution?" is published by the New Scientist From the intro: "We need assurances on privacy, security and transparency or smart cities may be seen as thinly disguised opportunities solely for tech titans" https://www.newscientist.com/article/2154414-who-will-really-benefit-from-the-coming-smart-city-revolution/ 
Smart Cities do not mean the Death of Privacy
"Smart Cities do not mean the Death of Privacy" article argues that the privacy problem regularly being discussed in the context of smart cities is not a smart city problem but rather a current market conditions problems. http://www.smartlink.city/could-smart-cities-do-not-mean-the-death-of-privacy/
PwC IIoT Operational Reference Architecture
The Industrial Internet of Things (IIOT) promises to revolutionize industrial and manufacturing activities, and disrupt today's business models. The CIO’s role will touch various parts of their company more than ever, and they will also need to help their businesses operationalize rapid changes in business models, from products to services, cloud-based models, outsourced models, and others.
Smart cities might not be such a bright idea
Financial Times published an opinion piece "Smart cities might not be such a bright idea" "Smart cities are being rolled out across the globe, particularly where populations are rising quickly, in countries such as India, China and parts of Africa. On paper at least, these urban fantasies share the same...
ENISA - Baseline Security Recommendations for IoT
The study which is titled ‘Baseline Security Recommendations for Internet of Things in the context of critical information infrastructures’, aims to set the scene for IoT security in Europe. It serves as a reference point in this field and as a foundation for relevant forthcoming initiatives and developments.
Slaughterbots
Interesting short video depicting a very scary future in which swarms of killer microdrones are dispatched to kill political activists and US lawmakers. Armed with explosive charges, the palm-sized quadcopters use real-time data mining and artificial intelligence to find and kill their targets.
Why the Entire C-Suite Needs to Use the Same Metrics for Cyber Risk
Excellent article from Harvard Business Review. The author recognizes that the members of the C-suite often aren’t speaking the same language around cyber risk and that the reporting lines and silos are impacting the enterprise-wide communication and coordination required to address new cyber risks...