supply chain

Parsing Google’s Internet of Things Acquisitions

Google has gone on an acquisition tear in the last six weeks that has many tech industry watchers wondering about the company’s future direction – particularly when it comes to the Internet of Things.   Since the beginning of the fourth quarter, 2013, Google has acquired 14 companies with the latest, a $650 million buy of UK-based artificial intelligence software firm DeepMind Technologies hitting the wires yesterday. In addition to the DeepMind buy, Google spent $40 million on Flutter, a maker of gesture recognition technology and $23 million on FlexyCore, maker of the DroidBooster App for Android. Earlier this month, it plunked $3.2 billion down for super hot smart home gear maker Nest. Google’s size makes the exact amount spent on the other acquisitions is something of a matter of speculation. Google only has to disclose transactions that are deemed ‘material’ to the company’s finances – a number somewhere between $10m […]

NSA Toolbox Included Hacks For Juniper, Cisco, Dell

The German magazine Der Spiegel made headlines this week with its story detailing the US National Security Agency’s (NSAs) offensive hacking capabilities. The story is based on classified NSA documents absconded with by former contractor Edward Snowden and lays bare a Webster’s Dictionary full of classified hacking tools and programs.   Among the highlights of the story: + The NSA developed and deployed a wide range of hacking tools that could compromise hardware from leading IT and networking equipment makers including Cisco Systems, Juniper Networks and the Chinese vendor Huawei and Dell Inc.   + The NSA tools were designed to provide persistent access that allowed the NSA to monitor activity on the compromised endpoint, avoid detection by third party security software and survive software and firmware updates. One such tool, DEITYBOUNCE, provided persistent access to Dell’s PowerEdge servers by “exploiting the system BIOS” and using “System Management Mode to […]

AT&T: Security A Top Issue For M2M In 2014

There’s an interesting 2014 predictions blog post by AT&T’s Mobeen Khan that offers some thoughts on where the market for Machine-to-Machine (or M2M) technology is going in the next 12 months.   According to Khan, an Executive Director of Marketing at AT&T Business, the M2M space is poised to take off in the next twelve months, as consumer demand for “smart” devices grows in both developed and developing markets, and as the M2M application stack matures, attracting the interest of developers. With M2M technology maturing, and the “Internet of Things” exiting its “gee whiz” phase, firms selling the technology no longer need to worry as much about justifying the return on investment for M2M and IoT technology.  As that happens, however, security will become the most pressing issue in the M2M space, Khan believes. “To date, companies deploying M2M solutions have looked to ROI as the #1 need. As the need/ROI of […]

Amphion Forum: Spotlight on Security and Internet of Things

A little more than a month from now, the world’s attention will shift to San Francisco for the annual RSA Security Conference – perhaps the biggest single IT security industry event of the year. But this week, at a much smaller venue, the focus will be about what’s amounting to the ‘next big thing’ in the security world: the Internet of Things.   The Amphion Forum focuses on a growing part of the computer security landscape that still struggles for attention in a security market still focused on the needs of large companies. Namely: the security challenges posed by mobile devices – phones and tablets and a menagerie of newly-connected endpoints, from wearable computers to implantable medical devices to household appliances. The privacy and security challenges facing organizations that wish to embrace the IoT are legion. Intelligent devices have been shown to lack basic protections against unauthorized access, such as strong […]

Smart Meters

Verizon: New Cloud Encryption Service Will Secure IoT Devices

Identity is one of the biggest challenges facing companies that are deploying products for the “Internet of Things,” as well as traditional enterprises that find IoT technologies of all types knocking at the door. The question, in short, is “how do I know that this device is legitimate, and ties back to an identity that I trust with access to my network resources and data? Of course, identity management has always been an aching problem in the enterprise space. The problem with the IoT is scale – given the sheer size of the IoT (30 billion connected devices by 2020), you can add a few “zeros” onto the number of devices that could, potentially, be seeking access to your network at any time. [Related read: Identity Management’s Next Frontier: The Interstate] It makes sense that, in a distributed environment like that, the cloud may be the best place to address […]