Tag: authentication

C

Cybersecurity lessons for 2020 and beyond

Good cybersecurity has tremendous potential to improve society, business and services we use every day. Because of its very nature, though, it involves discussion of bad actors and defensive measures, which can easily skew public perception. Indeed, big breaches seem to be occurring more and more frequently, and the bad guys are always in the headlines, making it all the more important to pause and take stock of the situation. In October, international stakeholders from academia, industry and government gathered in Japan for the third annual Cyber3 Conference Tokyo 2017. The two-day event was held at Keio University in conjunction

H

How To Make 2017 The Year Of IoT Security

People who make Internet of Things (IoT) devices still aren’t getting the message on security. And as these devices proliferate, the danger of increased attacks is getting more real. Late last year, popular internet services such as Netflix and Twitter were temporarily taken down amid a massive distributed denial-of-service (DDoS) attack that involved hackers deploying malware to simple webcams that many of us use without thinking. Authorities in the U.S. and U.K. were investigating the Mirai malware used in the attack to create a botnet, an army of zombie devices commanded by hackers. In fact, the Mirai code is still

T

The Big Chill: Don’t Let Cybersecurity Threats Slow Productivity & Economic Growth

Trust is an essential underpinning of life in the digital age. We trust our friends on Facebook not to share our private family photos. We trust our email clients and antivirus software to keep viruses and spam at bay. But for many people, the risks of using the internet are scary enough to curb their online activities. Earlier this year, the U.S. Department of Commerce’s National Telecommunications & Information Administration (NTIA) looked at the results of a survey by the U.S. Census Bureau in 2015. Out of 41,000 U.S. households, 19% reported security breaches, identity theft, or other malicious activity

H

Hackable medical devices and other security threats of the Fourth Industrial Revolution

Last year, researchers told the DerbyCon security conference that thousands of medical devices such as X-ray machines, MRI scanners and infusion pumps for medication were vulnerable to hacking. Inexcusably, many organizations still used the default passwords provided by manufacturers and a number were connected to the internet, posing not only a health risk to patients, but also a means to compromise personal information. These are just some of the risks associated with the internet of things (IoT), the movement to plug everything from cars to refrigerators into the internet. IoT is one of many tech buzzwords on people’s lips now.

W

Why internet security matters

Now that the Internet is an integral part of our lives, it’s easy to forget that 15 years ago it didn’t even exist, at least for most people. In fact, the Internet has been around for more than 45 years, with the original iteration functioning as a way for scientists and scholars to send messages to one another. So, how did the Internet grow from its academic origins to become the indispensable global tool we know today? Many would say its rise was due to the creation of the World Wide Web or the speed of data transmission that made

Do NOT follow this link or you will be banned from the site!