In-brief: Blockchain technology will have to clear a number of hurdles before it will be ready to serve as a core infrastructure for the Internet of Things, the author explains.
In-brief: The author argues that the devaluation of traditionally “soft” skills like empathy, communication and collaboration in the information security space may be hampering the ability of IT security teams to respond to human-focused threats and attacks.
I have a thing for makerspaces and hackerspaces, if you haven’t already noticed from my previous posts. To me, they are the epitome of what I love about the Internet of Things (IoT). It is something I call the democratization of innovation. The maker and hacker movements are global and are changing the landscape. They help to put technology and equipment, the opportunity to learn, develop ideas, prototype, and socialize and network in the reach of many who would not have otherwise had the opportunity just a few years ago. They are, to me, the nucleus of an evolution, if not revolution, of both innovation and society. I like to visit local hacker or makerspaces when I travel. At last year’s Internet of Things Solutions World Congress (IoTSWC) I learned about MADE Makerspace Barcelona, but just couldn’t make it there in person. A visit to MADE was locked into my […]
In-brief: a survey of registered voters finds that concerns about hacking and cyber security loom large in voters’ minds. So why isn’t there more discussion of cyber security and policy on the campaign trail? In this podcast, Security Ledger editor Paul Roberts talks with Ari Schwartz, the Obama Administration’s former Senior Director for Cybersecurity and Israel Barak, the Chief Security Officer at the firm Cybereason about the other elephant on the campaign trail: cyber security policy and hacking. With election day just two weeks away, the U.S. voting population is on pins and needles. While polls suggest that this election will not be as close as those in 2008 and 2012, uncertainty is in the air. One major party candidate is warning frequently of a “rigged” process, and the FBI and Obama Administration have pointed the finger of blame for hacks of major Democratic Party organizations at the government of Vladimir […]
In-brief: detecting anomalous behavior is a necessary part of incident response – but it’s also harder than it sounds, argues Alan Hall of BlueCoat Systems in this commentary.