The Internet of Things Connectivity Binge: What Are the Implications?

Read Lee Rainie and Janna Anderson study the implications of Internet of Things on Pew Research Center : Connection begets connection. In 1999, 18 years ago, when just 4% of the world’s population was online, Kevin Ashton coined the term Internet of Things, Neil Gershenfeld of MIT Media Lab wrote the book “When Things Start […]

UK’s ICO Doubled Number of Data Breach Fines in 2016

UK firms were among the hardest hit in Europe when it came to breach-related regulatory fines last year, as the ICO stepped its enforcement work up considerably, according to new PwC research. Read about the new research by PwC which reveals that breaches of the Data Protection Act (DPA) in United Kingdom resulted in 35 […]

Survey: U.S. execs bearish on 2018 cybersecurity spending, despite increase in threats

Only 49 percent of surveyed U.S. executives expect to spend more on cybersecurity in a year’s time, despite a 56-percent majority expecting the number of data breach attempts to rise in 2018, according to a new research study. Read about the new research by Ovum which reveals that nearly half of U.S. executives expect cyber security […]

Guidance for connected vehicle security: Attack vectors and impacts

The Cloud Security Alliance (CSA) released its first ever research and guidance report on connected vehicle security. Authored by the CSA’s Internet of Things (IoT) Working Group, “Observations and Recommendations on Connected Vehicle Security” provides a comprehensive perspective on vehicle security connectivity design, possible attack vectors of concern, and recommendations for securing the connected vehicle […]

Survey: Americans have shallow understanding of cybersecurity

When it comes to cybersecurity, Americans recognize the need for strong passwords and know that public Wi-Fi hotspots aren’t necessarily safe for online banking or e-commerce. But U.S. adults are not as good at recognizing email “phishing” schemes or determining if the website where they’re entering credit card information is encrypted. Read about the new Pew Research […]

IT Workers Expect Industrial Internet of Things Attacks to Rise

As the technology industry races to embrace the internet of things (IoT) and all the benefits it can bring, it has also been quick to warn about the security implications too. There have already been a number of examples of everyday IoT devices, such as security cameras and webcams, being hijacked and used to launch […]

Attention to cyber-security is becoming daily routine in the C-suite

While far-reaching and diverse, the underlying causes of security risks are amenable to collective action. According to new global research from The Economist Intelligence Unit (EIU), business leaders agree that they should, and can, think beyond the traditional horizons of their security efforts. Read about the new research by The Economist Intelligence Unit (EIU) which […]

Online Security Survey: Six in Ten Americans are Data Breach Victims

A large majority of Americans have been victims of one form of data theft or fraud or another, according to Pew Research Center’s latest online security survey. Americans not only are concerned about online threats from cybercriminals, they’re concerned about unauthorized surveillance and us by corporations and government. Read more about the new survey by […]

CIOs fear losing cyber fight against sophisticated hackers, lax users

A survey of 400 CIOs of large organisations in the US, UK and Germany finds majority fear they’re fighting a losing battle, says company promoting micro-virtualisation as a new approach to security.Users who ignore or forget their cybersecurity lessons, together with increasingly sophisticated hackers, are putting CIOs on the back foot when it comes to […]

Growing the Internet of Things, part 5: Security

Read Skip Ashton’s article about security aspect of Internet of Things on Embedded Computing : In part 1 we discussed the Cost of IoT devices, and how cost is being driven down by market factors including scale and advances in technology. Part 2 addressed Ease of Use considerations designers must make to ensure usability for […]