Recent Entries

The Internet of Things: Whose Data Is It Anyway?
Video Thumbnail: The Internet of Things: Whose Data Is It Anyway?

The Internet of Things: ...

Everywhere you look, it seems to be that everything is becoming “smart”.  On my wrist, I frequently wear a smart watch that monitors how many steps I take, what my heart rate is, and so on. At home, a smart thermostat can be controlled via an app, or even be programmed based on my own behavior. I can even have a camera that will either let me see who’s at the door, or let me talk to my cats while I’m in the office. All of these devices are generating one thing: data. The smartwatch is keeping track of my health data. The thermostat is keeping track of what’s going on inside my home. The cameras are keeping track of what they see and when they are turned on. A lot of this data is passed on to the providers of these services, which frequently say they are “free”. This may...
Defending Your Organization From Insider Attacks
Video Thumbnail: Defending Your Organization From Insider Attacks

Defending Your Organizat...

If you’ve read enough crime novels or seen enough action movies, the plot is all too familiar to you: an insider – acting to correct some slight or insult he or she received years ago – turns against an organization and inflicts significant damage. Sometimes the insider is on the side of the good guys, sometimes on the bad guys. This makes perfect sense. An insider knows exactly how an organization does things, what they consider valuable, and how they will respond to an attack. Who else would be better to carry out an attack than an insider? However, that assumes that an “insider threat” is by design. Fortunately, most people are not out to destroy the organization they belong to. Most people want the group that they are part of to succeed and do well. Unless you’re in an...
Vulnerabilities for Sale
Video Thumbnail: Vulnerabilities for Sale

Vulnerabilities for Sale

2014 showed that vulnerabilities could be found in all applications – both Heartbleed and Shellshock caught system administrators off-guard by revealing that open-source server applications could have severe vulnerabilities as well. The reality is that making software that is free from vulnerabilities is difficult and expensive, if not completely impossible. For every thousand lines of code, you can expect to find 15 to 50 errors of some kind. Maybe you can get that error rate down for truly critical applications like space exploration, but that adds time and money to the costs of software development. Despite the costs associated with doing so, developers need to do a better job of creating secure products. Changes in how software vulnerabilities are found and disclosed mean that the...
Light Can Keep the Dark at Bay
Video Thumbnail: Light Can Keep the Dark at Bay

Light Can Keep the Dark ...

We are all afraid of the unknown. Why? Because we all want to be in control of our lives: what career path to take, how to deal with our finances, where to go for a vacation. We like certainty. We love to know what’s ahead of us. We are hard wired like this. As far as technology is concerned, we don’t know what the next innovation would be like—how a product or service would affect our lives and the way we do things. Technology keeps surprising us. Yes, we have an idea of what could be the next trend because it is us consumers who dictate it, but that’s as far as we can go. Unfortunately, most vendors make their products with security at the bottom of their priority lists. The public is generally kept in the dark as to what goes inside a product. Nobody holds any guarantee. If...