What Bruce Schneier teaches us about IoT and cybersecurity

Bruce Schneier, cybersecurity expert, cryptologist

As if I haven’t said it a million times, IoT security is critical.

But just when I thought I had it all figured out, somebody comes along and sheds new light on this very important topic in a different way.

At a November 16 hearing held by the Congress Committee on Energy and Commerce in light of the devastating October 21 Dyn DDoS attack, famous cryptologist and computer security expert Bruce Schneier offered a new perspective on IoT security, which makes it easier for everyone to understand the criticality of the issue. Continue reading

Advertisements

What is secure messaging?

Secure messaging app

We rely increasingly on messaging apps to carry out our daily communications, whether for personal use or to do business. And there are literally tons of them on the internet and app stores, each sporting different features and social reach.

Having messaging apps have become an inherent part of our lives, we often use them to exchange sensitive information without regard to how capable they are of keeping that information secure. With messaging apps, we share personal information and photos, or report on sensitive issues in countries where the internet is strictly controlled and monitored by autocratic regimes.

So just how secure and trustworthy is your favorite messaging app? Here are four criteria that will help you decide. Continue reading

How blockchain and energy monitors will create the decentralized, renewable energy grid

Solar panels, renewable energy

By Stefan Grosjean, Smappee

There’s a lot of talk about using renewable and green energy sources, but the sheer amount of energy required to overcome the volatility and management hurdles have slowed down its mainstream implementation.

Fortunately, this is something that can be overcome with the use of revolutionary technologies such as Internet of Things, blockchain and artificial intelligence. Continue reading

The main barriers to successful adoption of SaaS

Cloud computing SaaS

By Mark Barlow, AppLearn

Most modern businesses, of any size and in any sector, rely on software as a service in some way, from Salesforce, used to manage customer relationships, to GoToMeeting, used to connect with colleagues and international clients, and Google Apps, which encompasses the search engine giant’s version of old faithfuls including Excel and Word (Sheets and Docs, respectively). Continue reading

Is social media helping or stalling democracy?

Social media-facebook

A lot of people are blaming last week’s victory of Donald Trump over Hillary Clinton in the U.S. presidential elections on social media, namely Facebook and to some extent Twitter, and their lack of control over the propagation of fake news.

Long story short, despite the results, they believe the American people wanted to elect Clinton, but propaganda and fake news sites promoted on social media led to Trump becoming the next president of the United States. At the very least, what it did was make things murky enough to disrupt the democratic process and trigger widespread protests across the country. Continue reading

How technology can prevent food shortage crises

agriculture plants

We’re being warned for years that the world is heading toward a food shortage crisis. The UN predicts that food production must double by 2050 to meet the needs of the planet’s steadily increasing population. Meanwhile, resources and land are becoming more scarce, and global warming is making things worse.

In fact, this is nothing new. Humanity has been dealing with food shortage since its dawn, and at every turn, it has found a solution to overcome the challenges. Agriculture was humankind’s first response to food shortage in an era where it relied on hunting for sustenance. Continue reading

Social media security can no longer be an afterthought

8583949219_d565d18edf_o

By Mike Raggo, Chief Research Scientist at ZeroFOX

In today’s threatening age, it’s impossible to navigate the web without crossing paths with some sort of virus, threat or scam. In the past few months especially, we’ve seen social media become a prime vector for scammers to target individuals, going after everyone from the CEO of Twitter (through his own platform mind you) to 117 million innocent LinkedIn individuals. In fact, in just May and June of 2016, five major social networks – LinkedIn, Tumblr, Myspace, Twitter and Russia’s VK – all suffered leaked user credentials. Continue reading