Hang on. Isn’t hyper-connectivity meant to be boosting service revenue? Why are we talking about protecting revenue? Mark Hearn explains more…
Healthcare is one of the largest and most innovative industries, yet its spending level in cybersecurity is alarmingly lagging compared to others. When you think of it, it really is staggering! Technology here evolves at […]
As a cybersecurity professional and a hobbyist painter, I recently revisited one of my past works, ‘Cyberattack’, and started to think about IoT security and the power of visuals a bit differently…
Cable companies, pay TV operators and telcos are often called service providers for the principal reason that they are not selling media and entertainment – they are selling a service. One of the most valuable assets they hold is a direct physical link into people’s homes and an ongoing monthly billing relationship.
From a pure business perspective that means anything a service provider can leverage to boost bandwidth usage and ARPU is fair game.
A group of U.S. senators recently introduced a new bill (the ‘‘Internet of Things (IoT) Cybersecurity Improvement Act of 2017’’) to address security vulnerabilities in connected devices. While this is a positive step toward improving baseline security for all devices bought and used by the government, it magnifies a much larger issue that is prevalent today in industries that are increasing their product’s connectivity to the Internet. Let me explain…
For the average consumer, hopping online to shop is as commonplace as physically going to the mall. No one thinks for a moment about how relatively unsafe it is to conduct business on the web. But in spite of our years’ long dependence on the web for commerce, it’s still astonishingly easy for cybercriminals to hack web-based transactions.
The reason? Web browsers. The fundamental insecurity of web browsers is arguably the weakest link in cyber security today.
The European Banking Authority has released the final draft of its Regulatory Technical Standards on authentication and secure communication for PSD2. In follow up to my original blog, I’m back with my analysis of the affect their final guidance may have on the consumer experience.
Sci-fi often portrays artificial intelligence (AI) like this: a computer watches people for a while, blinks darkly and decides the solution to the world’s problems is to kill off the human race. Thankfully we are far away from that. But what AI is capable of today is simulating a specific human brain function – such as pattern recognition. And that’s very exciting for security.
AI makes security practical in the open world
The world is now open, causing disruption in many industries and changing the demands on security.
Picture Bob. He thinks he’s figured out how to avoid paying for cable TV by watching programs streamed from pirate websites. One day, he’s watching a live football broadcast and ten minutes into the game, he loses all access. His screen goes blank. Is ruining the user experience on pirated sites a new combat strategy?
Seeing it differently
Degrading user experience may not be the first thing that comes to mind when considering how to combat cybercrime.
We live in a very different world today than we did 10-20 years ago. We’ve never been more connected. So, it’s surprising that software security practices remain in the realm of “We’ve always done it this way before”. Can they really expect to solve today’s security problems with an old way of thinking?
Traditional thinking typically starts with the premise that honest parties control the computer devices and any cryptographic operations are performed free from interference from would-be attackers. Given this, it’s probably understandable