Author's Latest Posts


Security Risk Escalating In 2015


Never has there been a more committed effort for malevolent entities to try to leak data, damage infrastructures, and wreak havoc on data essential to our lives. And never has there been a more opportunistic time for the security industry to put their best effort forward and answer the malfeasance challenge. So what is the current state of cyber security? "Unfortunately, there isn’t a l... » read more

Smart Grids, Smart Cities


What makes today’s power grid “intelligent” is the modernization of the technologies that both provide and support power distribution. These technologies use intelligent data analysis and communications, via a two-way, automated communications network to analyze what is going on within the grid. Information about the activities of both suppliers and consumers is collected, analyzed, an... » read more

Red Tape And Health Care Security


The health care industry is still woefully ill-prepared for the Cyber Age. This is a rather dismal assessment, considering that the volume of personal health-related data is an order of magnitude greater than the equivalent data in the financial segment and growing rapidly. Courtesy: Intel The past decade has seen the health-care records industry go electronic. While that may be great f... » read more

Biometrics For The IoT


In part one of this topic we started at the top with an overview of biometrics and its base technology. Now, let’s ratchet that up a notch and drill down a bit into some of the details. While biometrics has a lot of potential tools, presently there are only two that are in wide-scale deployment—fingerprint and facial scanning. “Of those two, fingerprints account for 60% to 70% of all a... » read more

Conspiracy Theory


The last couple of months have seen some interesting blips pop up on the security radar screen. To me, the most interesting on is the claim by Hugo Teso, a commercial pilot and security consultant and trained commercial pilot who claims to have developed an Android app that can remotely attack and take full control of an aircraft. The story goes that he was able to cobble together hardware and ... » read more

Is The IoT Safe To Use?


By Ernest Worthman & Ed Sperling Data security has been a problem since well before the invention the computer, and it has been getting progressively more difficult to contain every year for the past eight decades. It was made much worse when computing was decentralized with the introduction of the IBM PC in 1981, made worse again when networking was introduced into corporations by Novell'... » read more

The Next Generation Of Wearables


As the wearable market begins to take root, so has the focus on ultra-low power design—with some unique headaches that are unique to wearables. To begin with, there is much attention being paid to this market because of the almost staggering predictions associated with it. While numbers vary greatly, IDC predicts as many as 126 million units will be shipping annually by 2019. The five-year... » read more

New Robots For The IoT


Until recently, remote telepresence has largely been a fixed screen with a video link between participants, and mostly in business setting. But all of that is about to change once the [getkc id="76" comment="Internet of Things"]/Internet of Everything begins to take root. There is a plethora of development going on in mobile robotic telepresence (MRT). Companies such as iRobot, Cisco, Suitab... » read more

It’s Dark Out There


A while back, probably a year or so now, there was a blip on the radar screen about something called the “dark Internet.” I had pigeon holed that for later and frankly, just forgot about it. But a recent conversation I had with one of my SMEs circled around to that. So I though I’s see how the current scene has evolved, especially in light of the evolving IoT/E. There has always been ... » read more

Get Ready For More Biometrics


Security involving scans of fingerprints, palms, faces, or some other variant has been common in movies for years, and many phones and computers now offer fingerprint scans instead of a password login. But as security risks rise with the rollout of the [getkc id="76" comment="Internet of Things"]/Internet of Everything, that technology will need to become much more pervasive and sophisticated. ... » read more

← Older posts Newer posts →