hip webinar automating integration workflow 800x100 (1)
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 285
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 285
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
    [is_post] => 
)

Why Apple’s Fight is Fruitless!

Why Apple’s Fight is Fruitless!
by Maria Miccoli on 02-19-2016 at 7:00 am

The article suggested by LinkedIn is titled “Should Apple fight a court order to unencrypt iPhones? #unlockiPhone”. However, my question is this, why didn’t the FBI just go to the NSA for what they needed? Why didn’t the FBI just hire the latest hacker who was able to hack the iphone and give him the same deal other hackers… Read More


Quantum Computing – A Quick Review

Quantum Computing – A Quick Review
by Bernard Murphy on 02-09-2016 at 4:00 pm

This topic comes up periodically but for me had always been one of those things I’d get around to understanding better someday. A recent blog in SemiWiki got me looking a little harder and determined to write a blog to get this out of my system, if for no other reason than getting rid of excess tabs on my browser. So here’s my quick review.… Read More


Complexity And Security

Complexity And Security
by Bernard Murphy on 02-08-2016 at 7:00 am

From time to time when talking about security, it is useful to look at the big picture, but not to further lament the imminent collapse of the sky. We all know that the problem is big and we’re really not on top of it. A more productive discussion would be about what we can do to reduce the scope of the problem. And that has to start … Read More


Crypto Key Exchange …like taking candy from a digital baby

Crypto Key Exchange …like taking candy from a digital baby
by Bill Montgomery on 01-31-2016 at 4:00 pm

For those among you who have read my previous SemiWiki articles, you will no doubt see a theme: the security of our connected world is badly broken, and for the bad guys, violating our online lives – both business and personal – is as easy as taking candy from the proverbial baby.… Read More


Why IoT Security is a Market for Lemons

Why IoT Security is a Market for Lemons
by John Moor on 01-25-2016 at 4:00 pm

Concerns around the security of connected devices are continuing to rise. This is illustrated by July’s issue of The Economist where there are two articles on this theme outlining the perils of connected devices in the home, and more generally amongst the Internet of Things.

In “Home, Hacked Home: The perils of connected… Read More


Your Car Will Never be Secure

Your Car Will Never be Secure
by Roger C. Lanctot on 01-24-2016 at 4:00 pm

The automotive cybersecurity forum put on by the National Highway Traffic Safety Administration (NHTSA) yesterday in Washington, DC, surfaced a wide range of issues and conflicts at the heart of the connected car industry. One clear takeaway from the event was that cars will never be secure.
Read More


IoT Markets: let’s get real about the numbers

IoT Markets: let’s get real about the numbers
by John Moor on 01-20-2016 at 4:00 pm

I am not sure about you but whenever I see those big market forecasts for IoT (and I’ve seen a lot)… my brain takes a short cut to “ok, I get it, it’s big”. And I believe it will be. But is “it’s big” that helpful? Or, to put it another way, does it hurt?

Robin Duke-Woolley of Beecham
Read More


How to Secure the Internet of Things (IoT)?

How to Secure the Internet of Things (IoT)?
by Ahmed Banafa on 01-19-2016 at 12:00 pm

The Internet of Things (IoT) as a concept is fascinating and exciting, but the key to gaining real business value from it, is effective communication between all elements of the architecture so you can deploy applications faster, process and analyze data at lightning speeds, and make decisions as soon as you can.

IoT architecture… Read More


IoT Collateral Damage – it’s not if, but when

IoT Collateral Damage – it’s not if, but when
by Bill Montgomery on 01-14-2016 at 4:00 pm

Business history is littered with once-successful companies that couldn’t see the market tsunami that was coming their way until it was too late to do anything but stand up and be walloped by a wave of change that obliterated their businesses.
Read More


Privacy – the Other Face of Security

Privacy – the Other Face of Security
by Bernard Murphy on 01-13-2016 at 7:00 am

Security gets a lot of tech press, privacy not so much. A lot of the problem is that while we each know intuitively what we mean by privacy, pinning down an actionable definition is surprisingly tricky, especially when we require that it not intrude in other ways on our rights. Privacy rights are not absolute (you don’t have … Read More