Don’t Short-Change IoT Security
When we talk about the Internet of Things, it’s easy to get swept away by the sheer magnitude of the IoT market opportunity. After all, the numbers are enormous. More than 20 billion connected things...
View ArticleThe 6 D’s of Exponential Growth: How and When Cybersecurity Will Become Abundant
This year, I have been fascinated by two books about the near future and how entrepreneurs should think about market opportunities. “Abundance” by Peter Diamandis and Steven Kotler, and “Exponential...
View ArticleGet Ahead of Threats: Stay Focused
Everyone understands natural disasters are inevitable, and the economic, human, and social impacts can be enormous, if not deadly. So it’s imperative that representatives from all parts of the...
View Article3 Cybersecurity IoT Myths
This is not an article about why the Internet of Things is a big business opportunity. You already know that. Nor is it going to be about the fact that IoT initiatives need to account for cybersecurity...
View ArticleTrust in Healthcare goes beyond the physical
The concept of zero trust has gained a lot of interest and traction among cybersecurity professionals, and for good reason. As threat vectors expand and the ingenuity of bad actors increases, the...
View Article6 Degrees of IoT: The Kevin Bacon Theory of Networking
You don’t need to be a student of American cinema to know what the movies “Animal House” and “A Few Good Men” have in common: Kevin Bacon. Most, if not all, of us have heard about the Six Degrees of...
View ArticleThe Keys to Unlocking the Potential of AI in Health Records
Healthcare is one of the industries that stands at the forefront of reaping dramatic and demonstrable benefits from the increased use of artificial intelligence. AI offers real potential to save lives...
View ArticleWant a Secure IoT Experience? Automate, Automate, Automate
OK, let’s get the blah-blah-blah out of the way. IoT is a huge market opportunity. It is transforming how data is created, captured, and harnessed for business advantage. Tens of billions of smart...
View ArticleRemember That IoT Is Physical—Not Cyber
Business executives and board members are understandably excited—perhaps even giddy—about the potential for huge business upsides resulting from new Internet of Things (IoT) projects. And why not?...
View ArticleEdge Computing Is a Big Deal—Are You Ready for It?
I’m willing to bet my membership in Futurists Anonymous that at least one of your technology executives—CISO, CIO or CTO—has uttered the words “edge computing” in your executive staff meetings or...
View ArticleThe Growing Role of Machine Learning in Cybersecurity
Today, it’s impossible to deploy effective cybersecurity technology without relying heavily on machine learning. At the same time, it’s impossible to effectively deploy machine learning without a...
View ArticleNorth Dakota’s Big Cybersecurity Vision
The people of North Dakota have a lot to be proud of. Our state is a leader in agriculture, energy and national defense. We’re believers in humility and modesty—strong Midwestern values that define how...
View ArticleAdopting Private 5G Networks? Now, Think Security.
This is the second article in a two-part series on private mobile networks. Part one is about knowing your acronyms. The next industrial revolution, aka Industry 4.0, is on the horizon. Enterprises...
View ArticleNotPetya’s Hard Lessons on SCADA Cybersecurity
Tuesday, June 27, 2017, a morning like any other in Kyiv, hometown of Linkos Group. It’s a small family-run business that supports M.E.Doc, accounting software used by nearly 90% of Ukraine’s domestic...
View ArticleUnderstanding the Basics of IoT Security
When it comes to the Internet of Things (IoT), what you don’t know can hurt you. Organizations of all sizes are rapidly escalating their use of IoT devices for a wide range of business benefits: to...
View ArticleHealth Care and IoT Security: Your Devices Need a Physical
A robot performs surgery, operated by a doctor who is miles away; a patient swallows a pill containing a monitor that scans the digestive system; even humble stethoscopes and blood-pressure cuffs...
View ArticleSmart Cities Are Exciting—Until There’s a Cybersecurity Snafu
The ideas behind “smart cities” are becoming more relevant as leaders in government and business seek innovative ways to respond to the global COVID-19 pandemic. A recent article in Wired described...
View ArticleFrom Doorbells and Fish Tanks to Nuclear Reactors: Why Focus on IoT Security
As the world grows ever more connected, all our devices are becoming linked together. The activity tracker on my wrist wirelessly uploads data to my smartphone, which in turn controls entertainment...
View ArticleThe Myths of IoT Security
Conventional thinking about cybersecurity focuses on a basic concept: lock down every computing device in sight in order to keep out hackers, attackers and thieves. However, in a highly connected...
View ArticleThe Only Way to Secure the IoT Is Zero Trust
Smart toasters, washing machines that can tell the future, and Siri. The Internet of Things is so much more than simply billions of connected things. IoT is about critical infrastructure, like traffic...
View Article
More Pages to Explore .....