Category Archives: Internet Security
FBI Issues Drive-By Hacking Warning: This Is How To Secure Your Devices – Forbes
Getty
There is a gaping hole in our online securitythe surge of connected devices we now surround ourselves with. Now the FBI has warned that hackers can use those innocent devices to do a virtual drive-by of your digital life. The issue is the smart digital technologies encroaching into all aspects of our lives: Unsecured devices can allow hackers a path into your router, giving the bad guy access to everything else on your home network that you thought was secure. Are private pictures and passwords safely stored on your computer? Dont be so sure.
Youll have heard of the Internet of Things, IoT. In short, this is the surge of connected smart devices we are buying in droves. Gone are the days when your WiFi served just your phone, tablet and laptop. Nowadays, your TV and audio, home utilities, fitness equipment, power adapters, printer, phone and even your fridge can connect to the outside world. The same FBI team has also warned on the specific issues from smart TVs. All very convenientbut all very dangerous as well.
At a basic level, the issue with IoT is that we have limited control over software and settings. Your smartphone and laptop constantly updateyou may even run protective software, youre likely aware of the settings, you read about security issues. But when it comes to smart devices, the chances are that they carry the firmware they shipped with, the same admin passwords, the same settings. There is also probably an app you installed on your smartphone to set up the device. You clicked through the setup screens, giving the app various permissions, eager to get the device up and running. What these all have in common is that they send and receive data, the FBI explains, but do you know how that data is collected? And where it is going?
Unfortunately, hackers know youve likely done all of those things as well. IoT devices are fast becoming the soft entry points into our digital lives. Its no different at workMicrosoft and others have warned of attackers using printers and VOIP phone systems and even connected industrial systems to hit secure networks. Such devices have given sophisticated Russian and Chinese threat groups easy access. And the issue is the same at homevulnerable endpoints are much easier to tackle than secure systems. And as those IoT platforms look to the outside world for firmware updates and to your home network to interact, a risk is created.
The advice is basic network housekeeping:
The FBI also suggests that to secure home networks, your fridge and your laptop should not be on the same networkkeep private, sensitive data on a separate system from your other IoT devices. In truth, this is hard to do. Running separate networks at home requires a serious level of organisation and effort. It will also limit your interaction with those devices where they need to be on the same network as other devices. In truth, updating passwords and firmware resolves most of the risks.
The FBI warning has been backed up by the DHSs cybersecurity agency: As our reliance on IoT becomes an important part of everyday life, being aware of the associated risks is a key part of keeping your information and devices secure. CISA offers additional pointers in its Securing the Internet of Things advisory notice.
Follow the advice, do make sure those passwords are changed. And heres another tip, give some thought to what you really need to connect at home. Every device is a potential vulnerabilityevery smart plug, bulb, toy, appliance. If you need them, then keep them secure. Sometimes, though, the best type of security is controlling the risk. And that might mean occasionally saying no when asked to connect.
Link:
FBI Issues Drive-By Hacking Warning: This Is How To Secure Your Devices - Forbes
TikTok is the best place on the internet, but we have to say no – CNET
Chinese video sharing app TikTok.
Hi, my name is Daniel and I have a problem. A TikTok problem.
After dismissing it for months, TikTok was thrust upon me last month at, of all things, a bachelor party in Hong Kong. It was a little like The Hangover, but subtract drugs, strippers and Mike Tyson's tiger and replace it with a Chinese video app aimed at 16-year-olds.
And now I'm addicted. A feed comprised of millions of silly videos from people around the world, curated to my taste by artificial intelligence. I never really stood a chance. Recent favorites include a dog getting its nails clipped, a teen runner belly flopping into a pool of mud mid-race, and a stoner interrupting a college lecture to heat up popcorn with a microwave he brought from home.
TikTok stands out from other social media in one key way: You actually feel good after using it.Expanding Facebook friend counts lead to people sharing less, making the platform feel sterile. Studies show Instagram, acting as a highlight reel of other people's artificial lives, is harmful to self-esteem. Twitter is designed to be a platform for open conversation, but reduces people, arguments and ideas into 280-character caricatures.
Do you remember the last time you felt satisfied after using any of these apps? I don't. Not only do I remember the last time I felt satisfied post-TikTok (yesterday), TikTok has brought me closer to friends and colleagues. We share videos and laugh. We bond, which is what Facebook, Instagram and Twitter fail at.
But TikTok has to go.
My problem with the app isn't its guarantee to waste too much of my time. Though TikTok distinguishes itself by being fun to use, its parent company is like many Silicon Valley giants in one key way: It can't be trusted.
Paying attention to TikTok the app has made it necessary to pay attention to TikTok the company. And it's not a pretty sight.
The app is owned by Chinese firm ByteDance, currently the most valuable startup in the world. Being a company of any importance in China means working with the ruling Communist Party in some capacity. Tech platforms in the past have not only had to purge any mention of Tiananmen Square Massacre or Tibetan independence, but also remove "subversive" imagery like Winnie the Pooh and Peppa Pig.
"Firms such as Huawei, Tencent, ZTE, Alibaba, and Baidu have no meaningful ability to tell the Chinese Communist Party 'no' if officials decide to ask for their assistance," said US International Security bureaucrat Christopher Ashley Ford at a conference in September.
Like Huawei, TikTok denies this charge. The New York Times in November asked TikTok boss Alex Zhu what he would do if President Xi Jinping personally requested that he take down a video or share user data. "I would turn him down," Zhu proclaimed.
So it was a little suspicious when news broke that TikTok had taken down the profile of an American teenager promoting awareness about China's disastrous human rights abuses against Uyghur Muslims. TikTok says the 17-year-old's account was disabled not because of that video, but in relation to a TikTok featuring imagery of Osama Bin Laden.
It's an eyebrow raiser for sure, but plausible. Unfortunately for TikTok, and people like me who just want to love TikTok, the app has had a spectacular run of bad news since.
TikTok boss Alex Zhu told the New York Times he would deny a personal request for data or content moderation from Chinese President Xi Jinping.
A proposed class-action lawsuit filed in California claims the app has been illegally and secretly harvesting personally identifiable user data and sending it to China. A report out of Germany found TikTok had been hiding videos posted by LGBTQ and disabled users from people's feeds, which TikTok said was a temporary anti-bullying measure. A think tank backed by Australia's Department of Defense called ByteDance a "vector for censorship and surveillance," adding that it "collaborates with public security bureaus across China."
For its part, TikTok says it doesn't operate in China -- the country has an app called Douyin which is essentially TikTok with a different name and stricter, China-specific content guidelines -- and that it has no data centers in the country. "TikTok does not remove content based on sensitivities related to China," a spokesperson said. "We have never been asked by the Chinese government to remove any content and we would not do so if asked. Period."
TikTok is a platform filled with much-needed mindless mirth, and was the springboard for noted banger Ol' Town Road. But when you stack that up against accusations of harvesting user data, censoring what the Chinese Communist Party doesn't like and its parent company's alleged active assistance in human rights violations, it almost seems like it's not worth it.
A thought exercise: If you could go back in time and stop yourself and everyone around you from downloading Facebook, would you?
In 2019, Facebook feels inescapable. Dissatisfied users grumble about how they would delete it if they could, and it seems the ongoing privacy catastrophes do little to damage the company. Regulating Facebook fairly would be a tricky balancing act US lawmakers are reluctant to attempt.
Click for more Boom With a View.
No one could have expected this in 2008, when Facebook overtook Myspace to become the world's biggest social media site. Conversely, TikTok is just 3 years young but the red flags are already there.
It's hard to say what the ramifications of its huge user base could be but, based on past experience with social media giants plus the nature of business in China, we can guess it's probably not good. The US government isn't idling, with the Committee of Foreign Investment in the United States (CFIUS) already investigating the national security risks of TikTok and ByteDance, according to Reuters.
But governments move slowly, and tech companies move fast. Unlike Facebook, TikTok isn't yet too big to fail. But it certainly feels like we're at a crossroads. Support it now and potentially create a problem, or play it safe by giving up TikTok.
The reasonable choice to make is clear: When it comes to TikTok, just say no. But we're all pretty bad when it comes to making the reasonable choice. If we weren't, cigarettes wouldn't exist.
Even being a tech journalist aware of its issues, I don't want to give TikTok up. I'm guessing many of the hundreds of millions of teens who make up the app's main user base, and who largely don't know or care about the implications of an ascendant ByteDance, are less keen to hit uninstall.
It's time to admit it. We all have a TikTok problem.
Original post:
TikTok is the best place on the internet, but we have to say no - CNET
1 in 4 Americans Think Russia’s an ally; Sobering shipyard news; Reagan Forum preview, and more… – Defense One
The agenda for this years Reagan National Defense Forum is fixed firmly on the future, even as Congress struggles to pass a budget for the fiscal year that began more than two months ago. Meanwhile, its organizers have released their annual national security-themed public-opinion survey.
Perhaps its most eye-popping finding: 28% of Americans surveyed said that Russia is a U.S. ally. Belief in that falsehood is up from 19% last year. Still, 71% called Russia a threat to America, and 25% called it the greatest threat. But more people 60% of those surveyed, called China the largestthreat.
Otherhighlights:
Forum attendees are slated toinclude:
Subscribe
Get The Global Business Brief in your inbox:
The must-read news, analysis and insights about the intersection of business and international security.
Ill be moderating Saturdays 1:40 p.m. panel: Strengthening Nuclear Deterrence: Modernizing the Triad and Sustaining Arms Control in a Post-INF World. Panelists include Lisa Gordon-Hagerty, National Nuclear Security Administration administrator, Sen. Jeanne Shaheen, D-N.H. and Rep. Mike Turner, R-Ohio. Watch it live, here.
Youve reached the Defense One Global Business Brief by Marcus Weisgerber. Im heading to Simi Valley this weekend for the Reagan National Defense Forum, so shoot me a message if you want to link up. As always, send along your tips and feedback to mweisgerber@defenseone.com or @MarcusReports. Check out the Global Business Brief archive here, and tell your friends to subscribe!
Even large companies arent doing as well as they think they are, the assistant acquisition chief saidMonday.
Getting internet security right is key to the alliances veryfuture.
The alliance should up its members spending goals and count much-needed resiliency investment toward thetotal.
S-400 missile interceptors might just be the beginning of arms deals between Moscow and Ankara, according to a Reuters report, citing the Russian RIA state-run news organization. Rosoboronexports Alexander Mikheev told RIA news agency Moscow and Ankara were actively discussing Ankara taking up an option in the original contract for it to receive more S-400 systems, with talks focused on financial questions, Reuters reports. We hope that in the first half of 2020 we will sign the contract documents, RIA cited Mikheev as saying. But I want to stress that military technical cooperation with Turkey is not limited to the supply of the S-400s. We have big plansahead.
Over the past five years, Navy warships have spent some 33,700 more days in maintenance than expected, according to the Government Accountability Office. Do the math, and thats more than 92 years in maintenance delays. The Navy was unable to complete scheduled ship maintenance on time for about 75 percent of the maintenance periods conducted during fiscal years 2014 through 2019, with more than half of the delays in fiscal year 2019 exceeding 90 days, GAOs Diana Maurer wrote in prepared testimony for the Senate Armed Services seapower and readiness subcommittees. When maintenance is not completed on time, fewer ships are available for training or operations, which can hinder readiness. The Navys plan to improve those metrics will take 20 years and $21 billion, according to a new GAO report. Shortening maintenance was a top priority for former Deputy Defense Secretary PatrickShanahan.
The Navy on Monday signed a $22.2 billion deal with General Dynamics Electric Boat and Huntington Ingalls for nine Virginia-class submarines. The deal has an option for a tenth sub, which could increase the total value to $22.4billion.
Caroline Kennedy will christen a new aircraft carrier named for her father this Saturday at Huntington Ingalls Newport News Shipbuilding. As a 9-year-old in 1967, she helped her mother and brother christen the first USS John F. Kennedy.
The Air Force is planning an industry day to talk about the plane that will replace the E-4B National Airborne Operations Center. The new plane has been dubbed the Survivable Airborne Operations Center, or SAOC (presumably pronounced say-ock). The plane will be a new, cost-effective, commercial derivative aircraft aka something that already exists, like a new Boeing 747-8, which, by the way, appears to be nearing the end of its production run. The four 1970s-era E-4Bs need so much additional maintenance that theyre no longer flying the defense secretary on overseastrips.
The Pentagon is continuing its investment in hypersonic weapons, awarding Lockheed Martin a $989 million deal for the Air-Launched Rapid Response Weapon. The boost-glide weapon is undergoing tests at Edwards Air Force Base in California, Air Force Magazine reports.
The info will inform the creation and issuance of formal Requests for Prototype Proposals related to testing and experimentation projects focusing on 5G Dynamic Spectrum Sharing at Hill Air Force Base, Utah, and Smart Warehouse and Asset Management at Marine Corps Logistics Base Albany, Georgia, the Pentagon said in a Nov. 29 statement. The military intends to conduct 5G tech trials at Joint Base Lewis-McChord, Washington, and Naval Base San Diego, California. DoD, in coordination with industry, will develop and mature spectrum access technologies that enable improved cognizance of spectrum activity, protection of U.S. activity in the electromagnetic spectrum domain and provide the ability to relocate and/or share spectrum anytime and anywhere access is denied, the Pentagon said in a Nov. 29statement.
Amazon is famously contesting the Pentagons choice of Microsoft for its $10 billion JEDI cloud computing contract, but its not the only Jeff Bezos-owned company with a contracting beef. After rocket maker Blue Origin challenged the Air Forces method for evaluating prospective launch providers, GAO concurred,saying:
In summary, we find that the [Air Forces request for proposals] anticipated when combined best-value methodology fails to provide offerors with an intelligible and common basis for competition. We recommend that the Air Force amend the solicitation consistent with our decision and the requirements of applicable procurement law and regulation. We also recommend that the agency reimburse the protester its respective costs associated with filing and pursuing its protest, including reasonable attorneysfees.
Blue Origin is competing with United Launch Alliance, Northrop Grumman, and (also billionaire-owned) SpaceX for thejobs.
Private equity firm AE Industrial Partners has acquired AIM MRO, a leading manufacturer and supply chain manager of highly engineered consumable repair products and materials used primarily in the aerospace engine aftermarket. Its the private equity firms fifth acquisition thisyear.
The White House announced Thursday that President Trump plans to nominate James McPherson, the U.S. Army general council, to be Army undersecretary. A retired rear admiral who served as the Navys top JAG, McPherson has been serving as Army undersecretary since Ryan McCarthy moved up to the Armys top job over thesummer.
The White House announced on Nov. 25 that President Trump plans to nominate Charles Williams, a retired rear admiral, to be an assistant secretary of the Navy for installations, energy and the environment. Williams retired from the Navy in2005.
Boeing PR executive Anne Toulouse will retire from the companys top communications post at the end of the year, Boeing announced.
The Aerospace Industries Association will honor longtime Northrop Grumman spokesman Brandon Randy Belote with the 2019 Lauren Deac Lyman award for outstanding achievement in aerospacecommunications.
The Creeping Problems of 5G Security – The Hack Post
It is only in recent times that 5G has gained immense popularity and became a topic of discussion. As more countries and their systems are adopting for 5G technology, the factor of internet security should also be seriously considered. Discussions are going on among the experts for sorting out the security issues related to 5G. More companies are becoming knowledgeable about it and taking appropriate steps. But some problems still remain.
The casinos are working seriously for security purpose. Casino 888 is one such casino which works seriously on the security of their systems in spite of having 5G connection. So, one can play safely in this casino.
During these events and the elaborate discussions a lot of changes have been proposed with regards to the security of 5G. First of all there is a geopolitical facet that influences the 5G security but this is not all. There is more to the topic and this so because 5G is henceforth going to become an integral part of everyones lives. The dependence on mobile is increasing and decreasing the mobile telecom network plays a vital role here. With 5G coming into the scene, this part of life is going to change fundamentally.
The entire countrys infrastructure would directly get influenced as 5G will become a facilitator of industry, healthcare, agriculture, etc. With things getting such a turn, you can be rest assured that things are going to change for the better. It is said that with 5G, the play of mobile telecom network sector will increase to an area where controlling the function will be additional. So now, it is not only about storing and moving the data but also some added functions.
Let us see the security challenges that 5G is facing as per the speeches of the renowned personalities mentioned above. It is mandatory that before getting into all the details, you understand that 5G is going to be different in terms of operating unlike the previous mobile telecom networks. The main issue of security which was the wireless area that connects a phone to its network via radio waves to the base network has been resolved and reduced to a huge extent.
This was done while the standardization process was going on after it was found that the security issues have crept up. 3GPP or 3rd Generation Partnership Project is what the standard of 5G is set on. Security of the entire system has been checked and sorted out. This was done under the expert assistance of the IETF, Internet Engineering Task Force. The baseline from where 5G is being started is very high than the current mobile telecom networking systems.
Since this is a completely new area that has been ventured into, vulnerabilities are bound to happen. Experts have mentioned that the key areas that need more aid are divided, primarily, into 4 categories.
Also known as slicing, 5G networks will mostly use software to perform the programs that make them function. Earlier, this was being done on a single hardware but with 5G this has become customizable. Telecom industry can also design networks that are virtual and will only run on software. This can be customized to a point where a user will know what software they are comfortable in to operate a function.
It is for sure that 5G will have maximum cells or base stations and with the higher frequency, it will also provide excellent performance levels and one network can connect to multiple devices. It is anticipated that 5G will only raise the bar while it comes time expectations and level of performance. This was one of the most important requirements as users want ease of access and efficacy in whatever they do or connect to.
However, this may also lead to a problem that is also called threat surface which would increase with such accessibility. This is also something that is being worked upon and all the new devices are coming with advanced technologies. As mentioned earlier, it is now the entire control of the system that lies in your hands.
With 5G diverse networks will now be operated by various bodies all at one time that too smoothly. This also means that if the 5G network is being operated at one place it can reach out to a point where even a remote village will get the benefits. The crux of the matter here is to maintain one constant security level all throughout to safeguard all the configured data.
It will be maintained that security breaches are absolutely stopped in future which may be an upcoming concern. These breaches need to be checked and stopped so that the data and the privacy ofusers are kept safe and free from frauds and thefts. If this is not checked and corrected, this may lead to a huge breach of data where all personal details may be risked at the hands of frauds and data thieves. This will also lead to compromise in extremely personal data which involves bank details or healthcare data.
The solution to this is that enhanced and strong security measures have been formed to fit the requirements. This is also being done under the inspection of experts from the government along with other telecom sector regulators. A lot of scrutiny and work has to be done to make sure there are no faults and breaches in the system. The access has to be maintained in the highest form of security. Many countries have extremely well maintained and organized rules and regulations to ascertain that the safety of its people everywhere is dependable.
As educated individuals, people must come together and understand the procedures to stay safe and help others too. Security is not something individual, it is an envelope that is meant for everyone to enjoy. Take responsibility and act against the threat that can come up instead of ignoring the problem areas.
Original post:
The Creeping Problems of 5G Security - The Hack Post
Global Internet Of Everything (IoE) Market to Witness a Healthy Growth during 2020 – Statsflash
verview
The Internet of Everything (IoE) brings people, process, data and things together to form a networked connection which is more beneficial. The market is still in its nascent stage. The Global Internet of Everything (IoE) Market offers operational efficiency and enables better decision making. Increase in internet usage drives the IoE market growth. A strong demand across several entities high-speed processors, internet security and high network speed equipment sustains demand for IoE.
Market Analysis
The Global Internet of Everything (IoE) Market will be growing at a CAGR of 15.3% during the forecast period 20152020.
Increased adoption of IoE by state, federal, and local governments, non-governmental organisations, healthcare organisations, utilities, educational institutions drive the growth of the Internet of Everything (IoE) Market.
Internet proliferation, focus on big data, government initiatives, innovation in manufacturing technology are few growth propelling factors. Data transfer speed is a major constraint in the IoE environment due to the need for high traffic data transfer.
The Global Internet of Everything (IoE) Market is impacted by several technology trends such as mobility, data analytics, social networks, and cloud computing.
Get view Sample Analysis This Report:https://www.trendsmarketresearch.com/report/sample/10106
Growth potential is high in the emerging markets of Asia Pacific and Latin America. India and China are the fastest growing countries in the developing market. SMEs are the major end users for this technology as it yields them competitive advantage. Increasing FDI investments, improving connectivity, infrastructural investments and government initiatives for digital will positively impact the market.
Regional Segmentation
The Global Internet of Everything (IoE) Market is segmented and analysed by six regions- North America, Western Europe, Asia Pacific, Central Eastern Europe, Latin America and the Middle East & Africa. Each region is analysed in terms of technology, services, applications, and devices.
Segmentation by Technology
The Internet of Everything (IoE) Market is segmented and analysed by Infrastructure and Network Technologies and Application Technologies.
Key Vendors
Some of the key industry players include Bosch, Cisco, Ericson, IBM, Intel, and Oracle. The report also includes companies to watch for such as Axiros, Sigfox, and Wireless Logic Group.
Current and predicted business strategies for the leading companies of the market such as Cisco System Inc., PTC Inc. & Qualcomm Technologies, and Intel. Total 23 companies are covered.
Request For Discount On This Report at:https://www.trendsmarketresearch.com/report/discount/10106
Competitive Analysis
Competitive analysis (i.e. current and future key business strategies of the competitors and their regional growth). A detailed competitive profiling of all the major vendors in the market. Competitive benchmarking in terms of product/service offerings, mergers and acquisitions, strategic alliances, business strategies etc.
Benefits
The report will be useful for the key stakeholders of the IoE market such as technology providers, device providers, and application providers in the following ways:
The report provides an in-depth analysis of the Internet of Everything (IoE) market globally. Bringing out the key insights of the industry, the report aims to provide an opportunity for players ranging from SMEs to larger enterprises and even for the start-ups to understand the latest trends and technologies related to the IoE market.
The report provides a detailed analysis of the global industries in terms of technology, services, applications, devices, verticals and regions. The report entails information related to the latest industry and market trends, key stakeholders, industry pest analysis and competitive landscape. It includes implementation, opportunities and adoption rate of IoE in the industry. It also includes the end user analysis. This analysis was done based on global end user survey.
Original post:
Global Internet Of Everything (IoE) Market to Witness a Healthy Growth during 2020 - Statsflash
30 State and Local Government IT Influencers Worth a Follow in 2019 – StateTech Magazine
The concept of federalism is central to the American republic, and it diffuses power away from Washington, D.C., and out to state capitals, major cities and towns across the country.
That means that there is a wide constellation of players who impact state and local governments and the technologies they use. There is a correspondingly large number of those who influence the conversation around state and local IT. They include governors, state and city CIOs, analysts, journalists and podcasters.
So, to help government IT pros stay in the loop, StateTech has sorted through the most influential state and local government IT voices on the internet. In response to an evolving industry and ever-changing technology, weve adopted a new approach to keeping track of the industrys thought leaders, and have turned our Must-Read State and Local IT Blogger List into an influencer list that covers not just bloggers, but also Twitter personalities, podcasts, LinkedIn pros and those who use their social channels to get the word out.
Here is our curated collection of 30 state and local IT influencers, which we hope will be your go-to guide for keeping tabs on the latest in state and local government IT trends, smart cities and more. If youre on the list, spread the news and grab our IT influencer cover image for your Twitter page!
Ed Toner
Although hes not a Twitter superstar, Nebraska CIO Ed Toner is one of the most well-respected voices across the state government technology landscape. For several years, he has offered regular (usually monthly) updates on how he and his office are approaching innovation, cloud adoption and the business case for IT decisions.
James Collins
As both the CIO of Delaware and the former president of the National Association of State Chief Information Officers, Collins is a bright star in the state government IT firmament. Collis is active on LinkedIn, promoting happenings (IT-related and otherwise) in the First State.
Beth Niblock
Detroit is a city on the rebound, having emerged from bankruptcy protection and modernized its IT infrastructure under Niblock, who has been CIO of the Motor City since February 2014. Niblock keeps up an active Twitter presence and promotes news about how Detroit is reinvigorating itself.
Beth Simone Noveck
In August 2018, New Jersey Gov. Phil Murphy named Noveck the states first chief innovation officer. Noveck, who is a professor at New York Universitys Tandon School of Engineering, where she directs the Governance Lab, previously served as the deputy CTO for open government under President Barack Obama. Noveck has a robust Twitter following and regularly tweets about the intersection of tech and government services.
Bob Bennett
Before hanging out his shingle as the principal and founder of civic tech consulting firm B Squared Civic Solutions, Bennett was best known as the chief innovation officer for Kansas City, Mo., where he pushed for three years to get the city on the map as a smart city. Active on Twitter, Bennett is a great person to follow to stay informed on smart cities developments.
Mike Sarasti
Sarasti serves as the CIO of Miami, where he has been driving innovation since 2016. The city recently upgraded its website and has been adopting mobile technologies for divisions like the Department of Public Works. Hes another rising star on Twitter when comes to civic innovation and smart cities.
Krista Canellakis
Until November, Canellakis had served in various roles in the government of the city and county of San Francisco, most recently as chief innovation officer. Shes stayed active on Twitter since her departure and remains a consistent promoter of civic engagement and public service.
The Augmented City Podcast
Hosted by John du Pre Gauntt, an analyst with a background in economics, The Augmented City podcast is a semiweekly podcast that focuses on city life in the age of artificial intelligence. It has been running since the summer of 2016 and explores the how culture and technology are colliding as AI evolves from being just another technology people use to something that is shaping how people live.
The Smart Community Podcast'
The Smart Community Podcast is a hub that brings together a wide range of voices to discuss all things smart city, smart town and smart region. Its tagline is Making Smart Communities that are Accessible, Liveable and Sustainable for All. Hosted by Australia-based engineer Zoe Eather, the podcast has notched 145 episodes since February 2018, covering everything from smart mobility to cybersecurity and digital transformation.
Ruthbea Yesner Clarke
As global vice president of Government Insights and manager of the U.S. Federal Government and Worldwide Smart Cities and Communities Global practices at IDC, Clarke is one of the most connected and in-demand analysts around when it comes to government IT, and smart cities in particular. A frequent speaker at industry conferences, she brings a wealth of knowledge to the table, especially via her Twitter feed.
Shawn McCarthy
In addition to his expertise covering federal government IT, McCarthy, research director for IDC Government Insights, also brings his considerable analytical skills to bear when it comes to the state and local market. Active on LinkedIn, McCarthy is a font of knowledge and data when it comes to government IT trends.
GovLove Podcast
GovLove is a podcast from Engaging Local Government Leaders about the people, policies and profession of local government. Interviews with everyone from city managers to interns aim to learn more about their path into the public sector and highlight their work, and explore policy issues that impact local governments and the innovative solutions being used to address them, according to the podcasts website. The podcast has been running since 2015 and has 315 episodes in its catalog.
Dan Doctoroff
Doctoroff is the founder and CEO of Sidewalk Labs, a subsidiary of Google parent company Alphabet that focuses on smart city solutions, including the high-profile Quayside project in Toronto. Hes definitely someone to be connected with in the world of smart cities.
Toni Townes-Whitley
As president of U.S. regulated industries, Townes-Whitley is Microsofts point person for government affairs. She dives deep, not only into how the companys cloud and artificial intelligence solutions can help agencies but also into technologys impact on the environment and how to close the digital divide.
The United States Conference of Mayors
The U.S. Conference of Mayors is the official, nonpartisan organization of cities with populations of 30,000 or more, with each represented by its mayor. The organizations Twitter account regularly provides updates on what mayors and cities are doing to drive innovation.
Kim Hart
Hart, the managing editor of news site Axios, writes about smart cities and technology generally. She has a deep background covering tech as a reporter for Politico and The Washington Post, and also served as the press secretary for the Federal Communications Commission during the Obama administration. Follow her on Twitter for scoops on government technology news.
The National League of Cities
The National League of Cities is the oldest and largest national organization representing municipal governments throughout the United States, according to its website. Although not strictly focused on innovation and technology, the organizations Twitter feed is a great one to follow to keep track of urban policy and priorities.
Jared Polis
In November 2018, Polis was elected the 43rd governor of Colorado. Before getting into politics, Polis founded ProFlowers, an online florist, and he has made innovation a centerpiece of his agenda, including the launch of the Colorado Digital Service.
Jonathan Reichental
Reichental, the former CIO of Palo Alto, Calif., tweets regularly about emerging technologies, including digital twins and quantum computing. He currently serves as the founder and CEO of Human Future, a global business and technology education, advisory and investment firm.
Nicole Blake Johnson
Johnson is a seasoned government technology reporter who now serves as the managing editor for GovLoop. Active on both Twitter and LinkedIn, she is very tuned in to government IT tends.
Frost & Sullivan Information & Communications Technologies
Along with IDC, Frost & Sullivan is one of the premier market research and analysis firms out there when it comes to the Internet of Things and digital transformation. This is a great Twitter account for government IT leaders to follow to stay in touch with emerging technology trends.
Center for Internet Security
The Center for Internet Security is a nonprofit aimed at providing cybersecurity tools and standards for private sector and public sector organizations. The nonprofit runs the Multi-State Information Sharing and Analysis Center, a key organization for cybersecurity in state and local government. With nearly 30,000 Twitter followers, the center is an influential voice when it comes to IT security.
The University of Virginias Link Lab
UVAs Link Lab researches cyber-physical systems for smart cities, as well as autonomous systems and smart healthcare. Follow the lab to stay up to date on cutting-edge smart city research and development.
Dan Lohrmann
Lohrmann, a cybersecurity thought leader, uses his blog on Government Technology to help state and local government leaders sift through the hype about IT security and focus on what they can practically do to keep their communities safe. He is active on Twitter and is a key voice to follow for cybersecurity news and trends.
Bettina Tratz-Ryan
Tratz-Ryan is a Gartner vice president of research and is responsible for intelligent urban ecosystem research, including on smart cities. A thought leader on smart cities and urban sustainability, she brings a unique perspective, highlighting the governance and perspectives needed to make smart cities successful for both cities and residents.
Jeanne Holm
Holm, deputy CIO for the city of Los Angeles, is a major promoter of getting girls and women into IT and, of course, the City of Angels technology efforts. Holm is active on LinkedIn and, as the former evangelist for the White Houses open data initiative, is a huge proponent of open data.
Smart Cities Council
An industry coalition aimed at accelerating smart city adoption, the group brings together technology companies, city officials, universities, research institutes, national laboratories, development banks and more. Look here for thought leadership on smart cities.
Smart Cities Dive
Part of the Industry Dive network, Smart Cities Dive covers smart city industry news and provides original analysis on the latest trends in the smart city arena. Its tech coverage focuses on wireless technology, autonomous vehicles, the Internet of Things and more. Stay tuned to the publications Twitter feed, which has nearly 145,000 followers, for smart news and trends.
David Lee King
If you work in public library, you need to follow David Lee King, the digital services director at the Topeka & Shawnee County Public Library. He regularly offers insights on how to incorporate technology into public library programs.
FirstNet
FirstNet, or the First Responder Network Authority, the first nationwide, high-speed broadband network dedicated to public safety, now has 1 million network connections and 10,000 public safety agency subscribers. Check out its Twitter feed not just for news on the development of the network but on developments in public safety technology as well.
Read more:
30 State and Local Government IT Influencers Worth a Follow in 2019 - StateTech Magazine
Concern rises over Nigerias cyber space – The Nation Newspaper
The data of many Nigerians entrusted with organisations and individuals are daily compromised. This has increased worries about the security of Nigerias cyber space. NAN reports.
OFTEN Nigerians are inundated with messages on their telephone sets and e-mails asking them to subscribe to goods and services.
The recipients, especially public service workers, are encouraged to apply for loans from micro-credit outfits on very liberal conditions, including not providing securities for the facilities.
Repayments for such loans, which can be obtained within 24 hours, are cheap with interests on single digit.
Others request prospective subscribers to buy household goods on credit and the repayment plan spread overtime.
Prospective subscribers are asked not to worry about the mode of repayment since the vendors can access their payroll information from their employers.
This has often been the case with Federal Government employees enrolled in the Integrated Personnel Payroll Integrated System (IPPIS).
While the promoters of the services claim they work with IPPIS, the agency under the Office of Accountant-General of the Federation, denies knowledge of the transactions. Meanwhile, the workers on the receiving end moan.
Apart from public sector workers, bank customers receive similar solicitations from banks which they do not bank with. The banks ask them to apply for loans.
For instance, in 2015, Amecom investment, a marketing company based in Abuja approached staff of a government agency to solicit patronage for its goods. In spite of not supplying goods, IPPIS deducted sums from the salaries of persons who showed interest.
Mr Livinus Ugochukwu, a former employee of News Agency of Nigeria (NAN) said that in August 2018, IPPIS deducted N10,158.33 from his salary and credited Full Range Micro-Finance company, an organisation he did not know.
Ugochukwu said IPPIS also deducted N8,784 from his salary in May and credited Brain Integrated System, another organisation he did not know.
Another public sector worker, Mrs Hadiza Aliyu, said she received a text message from CreditWallet, a micro-credit company, telling her that she had been pre-qualified for N500,000 loan.
On enquiry about how the loan would be re-paid, a desk officer with the company said the group was working with IPPIS.
In all cases, the data of the prospective subscribers are compromised by organisations and individuals they had been entrusted. And so many worry about the security of Nigerias cyber space.
This is more so as Nigeria works toward establishing a digital economy with the re-christening of Ministry of Communications as Ministry of Communications and Digital Economy.
Cyber security or information technology security is the body of technologies, processes and practices designed to protect networks, devices, programmes and data from attack, damage or unauthorised access.
Highly beneficial to government, the military, corporate institutions who store unprecedented, sensitive information on computers and other platforms, such data require protection.
According to Deloitte, a multinational network company that provides audit, tax, consulting, enterprise risk and financial advisory services, countries, including Nigeria, are facing cyber security breaches.
The most recent case was the Facebook data scandal that affected up to 87 million users, while there were cases of phishing attacks, malicious software embedded at the point of payment and ransomware that affected unsusceptible citizens.
Central Bank of Nigerias Cyber Security Framework and the European Unions General Data Protection Regulation (GDPR) raised awareness on cyber security in the country in 2018.
An ICT security expert, Mr Kenneth Okereafor, said there were serious cyber attacks on public, private sector targeting vital operations and assets.
Okereakor said the attacks were organised, disciplined, aggressive, well resourced with perpetrators as nations, terrorist groups, criminals, hackers or people with intention to compromising internet security.
Currently, there is effective deployment of malicious software causing significant potential disruption of critical information systems and services, as well as over commercialisation of cyber security skills and the exploitation of citizens ignorance.
The expert said a survey reported that 60 per cent of Nigerian firms suffered cyber attack yearly.
He claimed the Federal Government lacked guidelines and standards for the acquisition of technology infrastructure and solutions across systems as well as risk management processes.
The mechanism for cyber incident response is not standardised in agencies, government enforcement of compliance to existing cyber security legislations is weak and there is no prioritisation of cyber security capacity development in federal agencies.
Okereafor urged government to adopt a single Technology Risk Management Framework supported by legislation to incorporate internet security as part of information system acquisition and implementation.
As an oversight, the Federal Government can create a single Technology Risk Body to provide a consistent framework for protecting information at all levels.
He said with cyber risk management framework, citizens and the country would have enabled strategic, long- term and short-term cyber security and consistent management of technology supply chains.
The expert said the framework would bridge the gap between technology and business and provide realistic support for existing, future regulation requirements.
Dr Vincent Olatunji, the Chairman, Data Implementation Committee, National Information Technology Development Agency (NITDA), also acknowledges the threat to Nigerias cyber space.
Olatunji said: Individuals own their information. Data collected on a consumer cannot be sold to third parties.
Companies must protect an individuals Internet Protocol (IP) address or cookie data with the same rigor as a name, address, national identity number and bank verification numbers and also request for data transfer.
He said if cyber security must be applicable to systems in the country, privacy of data must be designed in respect of the data subject and policies and procedures for managing security breaches put in place.
Businesses need to review their data protection policies, technology for compliancy; they should encrypt data in their possession and be up to date with security solutions.
Personally obtained data and collected by a data controller with consent from the subject should be used for the specific purpose and not for the promotion of businesses or distributed without authorisation, Olatunji said.
View original post here:
Concern rises over Nigerias cyber space - The Nation Newspaper
Global and Regional IT Security Spending Market 2019 by Manufacturers, Countries, Type and Application, Forecast to 2025 – Industry News Releases
The "and Regional IT Security Spending Market" report contains a wide-extending factual assessment for and Regional IT Security Spending, which enables the customer to separate the future complicity and estimate the right execution. The advancement rate is evaluated dependent on insightful examination that gives credible information on the worldwide and Regional IT Security Spending market. Imperatives and advancement points are merged together after a significant comprehension of the improvement of the and Regional IT Security Spending market. The report is all around made by considering its essential information in the overall and Regional IT Security Spending market, the essential components in charge of the interest for its products and administrations. Our best analysts have surveyed the and Regional IT Security Spending market report with the reference of inventories and data given by the key players (Check Point Software Technologies, Cisco Systems, EMC, Fortinet, Juniper Networks, McAfee, Palo Alto Networks, Symantec, Trend Micro, Akamai Technologies , Avast Software, AVG Technologies, Barracuda Networks , Citrix Systems , Dell SonicWALL, F5 Networks, Hewlett-Packard, IBM, Imperva , Microsoft , Panda Security, Radware , Sophos, Trustwave Holdings), flexible sources and records that help to upgrade cognizance of the related methodological conditions.
Ask for sample link here: http://www.intenseresearch.com/market-analysis/global-and-regional-it-security-spending-market-2018.html#request-sample
The and Regional IT Security Spending market report shows a point by point division (Internet security, Endpoint security, Wireless security, Network security, Cloud security) of the overall market reliant on development, product type, application, and distinctive techniques and systems. The point-to-point elucidation of the and Regional IT Security Spending market's assembling system, the usage of advancement, conclusions of the world market players, dealers and shippers' order, and the explicit business data and their improvement plans would help our customers for future courses of action and movement planned to make due in the and Regional IT Security Spending market.
The and Regional IT Security Spending market report includes the latest mechanical enhancements and new releases to engage our customers to the configuration, settle on taught business decisions, and complete their required executions in the future. The and Regional IT Security Spending market report moreover focuses more on current business and present-day headways, future methodology changes, and open entryways for the and Regional IT Security Spending market. Nearby progression frameworks and projections are one of the key segments that clear up overall execution and incorporate key geological analysis (Powerboats, Yachts).
Inquire about the report here: http://www.intenseresearch.com/market-analysis/global-and-regional-it-security-spending-market-2018.html#inquiry-for-buying
The overall and Regional IT Security Spending market is made with the fundamental and direct conclusion to exploit the and Regional IT Security Spending market and participate in business progression for imperative business openings. The correct figures and the graphical depiction of the and Regional IT Security Spending market are shown in a represented strategy. The report shows an examination of conceivable contention, current market designs and other basic characteristics all around the world.
Thanks for reading this article; you'll be able to additionally get individual chapter wise section or region wise report versions like North America, Europe, Asia-Pacific, South America, geographic area and continent.
View original post here:
Global and Regional IT Security Spending Market 2019 by Manufacturers, Countries, Type and Application, Forecast to 2025 - Industry News Releases
NAPCO Security Technologies to present at the Imperial Capital Security Investor Conference on December 11, 2019 – PRNewswire
AMITYVILLE, N.Y., Dec. 6, 2019 /PRNewswire/ -- NAPCO Security Technologies, Inc. (NasdaqGS: NSSC), one of the world's leading solutions providers and manufacturers of high-tech electronic intrusion security, school safety lock down systems, Internet of Things (IoT) connected home, video and fire systems, as well as enterprise-class access control and door locking products, today announced that management will be presenting at the Imperial Capital Security Investor Conference in New York, NY on December 11, 2019.
NAPCO management will be presenting at 3:15PM ET and hosting one-on-one meetings throughout the conference. The topics to be highlighted during the conference will include recently reported Fiscal Q1 2020 results, the business mix shift to recurring revenues with higher margins from the Starlink Communicator family of products and addressing the urgent need for securing the schools in the US. NAPCO has a product portfolio for school security that fits the needs of K-12's and large universities.
To receive additional information, request an invitation or to schedule a one-on-one meeting, please contact your Imperial Capital sales representative or Patrick McKillop, Director IR for NAPCO at pmckillop@napcosecurity.com.
About NAPCO Security Technologies, Inc.
NAPCO Security Technologies, Inc. is one of the world's leading solutions providers and manufacturers of high-technology electronic security (including recurring service fee revenue), IoT connected home, video, fire alarm, access control and door locking systems. The Company consists of four Divisions: NAPCO, its security and IoT connected home segment, plus three wholly-owned subsidiaries: Alarm Lock, Continental Instruments, and Marks USA. Headquartered in Amityville, New York, its products are installed by tens of thousands of security professionals worldwide in commercial, industrial, institutional, residential and government applications. NAPCO products have earned a reputation forinnovation, technical excellence and reliability, positioning the Company for growth in the multi-billion dollar and rapidly expanding electronic security market. For additional information on NAPCO, please visit the Company's web site at http://www.napcosecurity.com.
Safe Harbor Statement
This press release contains forward-looking statements that involve numerous risks and uncertainties. Actual results, performance or achievements could differ materially from those anticipated in such forward-looking statements as a result of certain factors, including those set forth in the Company's filings with the Securities and Exchange Commission.
Contact:Patrick McKillopDirector of Investor RelationsNAPCO Security Technologies, Inc.OP: 800-645-9445 x 374CP: 516-404-3597pmckillop@napcosecurity.com
SOURCE NAPCO Security Technologies, Inc.
FBI Warns Your Smart TV May Be Spying On You 12/06/2019 – MediaPost Communications
Just as Santa is lining up masses of connected holidaygifts for delivery, comes a cautious word from the FBI on how to connect all those smart things.
Smart devices such as home security devices, thermostats, fitness trackers, refrigerators,smart watches and light bulbs, basically any device that can connect to the internet, present a potential problem if not properly managed, according to FBIs Tech Tuesday blog.
Smart TVs also could present issues.
Beyond the risk that your TV manufacturer and app developers may be listening and watching you, that television can also be a gateway for hackersto come into your home, states the FBI. A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give an easy way inthe backdoor through your router.
advertisement
advertisement
The FBI suggests keeping Internet of Things devices on a network separate from the one used for sensitive data.
Here are the FBIsspecific tips on how to build a digital defense:
Santa may deliverthe smart products, but may not include security and privacy directions along with them.
More:
FBI Warns Your Smart TV May Be Spying On You 12/06/2019 - MediaPost Communications