Other News

Terms of DIsservice Cover

Book argues for New Laws to break Social Media Monopolies

The US economy hasn’t simply allowed tech giants to ignore the social harms of their platforms; it has incentivized it. In his new book, Terms of Disservice, Dipayan Ghosh says regulation may be the only solution.

Internet of Things Concept Image

Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things

In this Spotlight Podcast Intel Fellow Claire Vishik joins us to talk about the evolving concept of online “trust.” Vishik is a TCG Director and spent 14 years as the Director of Trusted Technologies at Intel.

IBM Quantum Computer

How NIST Is Securing The Quantum Era

Quantum computers powerful enough to break the strongest classical encryption are at least a decade away, but the time to develop quantum safe encryption is now. In this opinion piece, Thomas Pöppelmann, a Senior Staff Engineer, Security Architecture and Cryptography Research at Infineon Technologies talks about the steps NIST and companies like Infineon are taking to make that happen.

IoT Security Image

Episode 186: Certifying Your Smart Home Security with GE Appliances and UL

In this episode of the podcast (#186) we do a deep dive on the new IoT cyber security rating system from Underwriters’ Lab. We talk with experts from GE about the process they used to obtain UL certification for a range of smart home appliances, managing device security over the decades and how a cyber security rating system may influence consumers’ behavior.

Password Image

What’s Good IAM? The Answer may depend on your Industry

Mature identity and access management (IAM) is a pillar of enterprise security. But what makes IAM “good” for your business may depend on the kind of business you are in, and the demands of your industry, writes Rachael Stockton of LogMeIn and LastPass.