Recent Posts

Data Security

Follow

Follow X

Sign up   |   Log in

  • Minimum length of 8 characters

    The IoT Library: Diffie and Hellman’s public-key cryptography wins ACM Turing Award

    By Richard Wallace | March 21, 2016

    The IoT Library: Diffie and Hellman’s public-key cryptography wins ACM Turing Award

    The battle between Washington and Silicon Valley over encryption and intelligence gathering wasn’t always the conspicuous battle it has become. Snowden and NSA’s constitutional abuses set the stage for the current standoff between industry and government. But back in the early days of Silicon Valley big government contractors like Lockheed were the tech behemoths of the day – giants that defined the industry and helped create, via U.S.

    Data Security

    Follow

    Follow X

    Sign up   |   Log in

    • Minimum length of 8 characters

      Automobile, medical device hackers get shield from copyright litigation

      By Richard Wallace | October 29, 2015

      Auto, medical device hackers get shield from copyright law

      One of the best ways to improve product reliability, data security, and consumer trust, is to allow the independent code analysis community – otherwise known as hackers – access to things like medical devices and automobile emissions software for testing purposes.

      But until now, companies that incorporate software into consumer products, like Volkswagen, have successfully barred independent security researchers from even looking at their under-the-hood code using the threat of copyright litigation.

      Data Security

      Follow

      Follow X

      Sign up   |   Log in

      • Minimum length of 8 characters

        While the IoT gets personal, what happens to data security?

        By Nitin Dahad | October 15, 2015

        • While the IoT gets personal, what happens to data security?It seems that it is now possible to connect almost anything, and monitor or measure almost anything. At the recent IoT Solutions World Congress in Barcelona, a key message was that the value of IoT is not just in the connectedness but in the value of that data and the interpretation of that data. We asked Adrian Caceres, CTO, VP engineering & co-founder of Ayla Networks, who was on a European roadshow, to give his verdict on one aspect of this – what happens to the data, who owns it, and do we have any control over it?

        Data Security

        Follow

        Follow X

        Sign up   |   Log in

        • Minimum length of 8 characters

          Privacy ‘Safe Harbor’ invalidated by European court

          October 15, 2015

          Privacy 'Safe Harbor' invalidated by European court

          U.S. officials and technology company executives are scrambling to deal with the fallout from last week’s European Court of Justice ruling that nullified a privacy ‘safe harbor’ – in place for 15 years- that let American companies like Google, Microsoft and Facebook store Europeans’ personal data outside the E.U.

          Now void, the Safe Harbor Framework provided cover for thousands of American companies operating in the E.U., nominally shielding them from data transfer rules inherent in European’s  stringent privacy regulations.

          Data Security

          Follow

          Follow X

          Sign up   |   Log in

          • Minimum length of 8 characters

            It’s time for Silicon Valley and Washington to stop fighting over cybersecurity

            By Richard Wallace | July 20, 2015

            encryption

            Arguing that the growing use of encryption is neutralizing its investigative capabilities, the U.S. government has reached for the biggest weapon at its disposal: mandated exceptional access. The government wants a back door to private, encrypted communications by requiring device, system and software makers to provide a set of soft or hard keys.

            Data Security

            Follow

            Follow X

            Sign up   |   Log in

            • Minimum length of 8 characters

              The mad scramble to find a pot of gold in cybersecurity

              By Richard Wallace | July 15, 2015

              Could last week’s massive hack of personal information on more than 22 million people at the U.S. Office of Personnel Management further swell the river of venture capital that has flowed into cybersecurity startups over the last two years?

              The influx of venture capital for cyber deals reached a peak of $1.77 billion this year, with no letup in sight. High-profile closings, funding and deals are hitting the newswires daily, like the recent closing of a $100 cyber VC fund by Capital deal for $100 million cybersecurity startups VC fund, Splunk’s acquisitioin of cybersecurity startup Caspida for $190M, Distil Networks close of a $21M VC round led by Bessemer Venture Partners, Intel Capital, Liberty Israel Venture lead $9M funding of TrapX Security, and Darktrace, raises Further $18M.

              Internet of Things, Data Security

              Follow

              Follow X

              Sign up   |   Log in

              • Minimum length of 8 characters

                Why you should be paranoid about Bluetooth LE

                By Richard Wallace | May 28, 2015

                stay paranoid and trust no one

                Bluetooth’s Low Energy mobile application specification is rife with cyber security flaws, a development that comes to light as the ubiquitous wireless data standard has begun to permeate all levels of the Internet of Things.

                Bluetooth Low Energy (BLE) is at the center of the latest ‘Context’ security alert, a warning that BLE signals transmitted by “many mobile phones, wearable devices and iBeacons, including the iPhone and leading fitness monitors, could be easily recorded and monitored.”

                The encryption flaw is said to leave users vulnerable to cyberattack and the possibility of digital eavesdropping and the collection of unencrypted confidential information about personal health and other data.