Menu

Blog

Archive for the ‘security’ category: Page 134

Feb 14, 2016

Bringing Innovation into Cyberdefense Technologies

Posted by in categories: cybercrime/malcode, internet, security

Nice article; something that I agree very much with is the perspective that both Cyber Security is intertwined with technology innovation and adoption. Tech and other companies creating products or even services that leverages the net, can easily see their revenue potentials impacted due to poor Cyber Security. Example, Hello (Wi-Fi) Barbie by Mattel; when it was announced that the doll was indeed hackable; many buying consumers buying for their children left her on the shelf.


Hackers use innovative thinking when breaching systems, why can’t government?

by Larry Karisny

Continue reading “Bringing Innovation into Cyberdefense Technologies” »

Feb 14, 2016

Top CEOs Focusing on Cognitive Computing

Posted by in categories: business, cybercrime/malcode, internet, neuroscience, robotics/AI, security

I believe it is wonderful to think about cognitive computing. However, as a fellow CIO & CTO, I would suggest a key priority has to be focused on Cyber Security until it is resolved; or in a better position to proactively blocker would be intruders. Without a solid Cyber Security plan and model in place and operational; your cognitive computing capabilities will be worth nothing in the end once hackers are helping themselves to your IP and other information as well as your AI machines.


The news comes from the recent IBM Institute for Business Value study, “Redefining Competition: Insights from the Global C-suite Study — The CEO perspective.” Researchers interviewed more than 5,000 C-level executives worldwide about their perspectives on a variety of technology issues, including the importance of mobile solutions, cloud Relevant Products/Services computing, and the Internet of Things.

Torchbearers and Market Followers.

Continue reading “Top CEOs Focusing on Cognitive Computing” »

Feb 14, 2016

Chinese cyber strategy-building deterrence

Posted by in categories: cybercrime/malcode, military, security, space

China’s public report on their own Cyber Security Strategy — don’t get too excited; it is a “public” version of their plan (mean nothing in depth).


New cyber warfare unit

While China was assessed to have cyber warfare capabilities for quite some time, the declaration by its Central Military Council of the formation of a new military branch focussed on digital battleground technically called Strategic Support Force on 1st Jan. 2016 confirmed this. This new force is mainly aimed at providing resources capable of protecting China’s cyber and space security. On this occasion Xi pointed out that this force is central to achieving the “Chinese Dream” suggesting its importance.

Continue reading “Chinese cyber strategy-building deterrence” »

Feb 14, 2016

Clueless In Cyber-Security Land

Posted by in categories: cybercrime/malcode, neuroscience, robotics/AI, security

Very good read; and hints at something that I have been highlighting for a while around AI, NextGen transformation and adoption, etc. One very large brick wall that I highlighted in my latest posts around 5 areas that need to be address for AI to be adopted more broadly is Cyber Security.

If we do not get Cyber Security address soon around hackers, cloud, etc. AI (including robotics), brain interfaces, etc. will be either rejected or very limited in its adoption. It is just that simple.


What are CISO’s (Chief Information Security Officers) worrying about in 2016?

Continue reading “Clueless In Cyber-Security Land” »

Feb 14, 2016

North Korea Aims For Submarine-Launched Nuclear Missiles

Posted by in categories: military, security, space

This story crosses into the realm of satellite launchers and commercial space, but has troubling implications for international security. I personally am a bit more worried about North Korea’s ability to secure ballistic sub-launched weapons of mass destruction since I think that they offer more stealth than an ICBM silo, which we can fairly easily detect.


North Korea’s potential intercontinental ballistic missile (ICBM) threat may be stealing headlines, but the rogue state’s interest in submarine-launched nuclear weapons is arguably even more worrisome.

Read more

Feb 14, 2016

History: I know that we often write about the future, etc

Posted by in categories: education, food, habitats, security, sustainability

However, one also must look at the past for insights and guidance on things that were done wrong to ensure bad history is not repeated.

Therefore, let me share with you a part of history that we need to be aware of and protect our future from ever repeating again.

Many folks have never heard of Poor Farms in the South and Poor Houses in some parts of the Midwest. Before soc. Security and Welfare we had poor farms/ houses. They date from the late 1800s until 1930s.

Poor farms/ houses were often filled with the elderly and others that had no money or anyone to take care them. People often worked the land for 16+ hours days, dressed in rags, and had very little to eat. Once you were there you could not leave ever until you died.

Continue reading “History: I know that we often write about the future, etc” »

Feb 13, 2016

IoT Could Be Used by Spies, U.S. Intelligence Chief Says

Posted by in categories: business, electronics, habitats, internet, security

More Intel Concerns


James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries.

As the Internet of things has grown, so has the debate about security around it.

Continue reading “IoT Could Be Used by Spies, U.S. Intelligence Chief Says” »

Feb 12, 2016

Yes, robots will steal our jobs — but don’t worry, we’ll get new ones

Posted by in categories: biotech/medical, business, economics, employment, ethics, neuroscience, robotics/AI, security

Again, I see too many gaps that will need to be address before AI can eliminate 70% of today’s jobs. Below, are the top 5 gaps that I have seen so far with AI in taking over many government, business, and corporate positions.

1) Emotion/ Empathy Gap — AI has not been designed with the sophistication to provide personable care such as you see with caregivers, medical specialists, etc.
2) Demographic Gap — until we have a more broader mix of the population engaged in AI’s design & development; AI will not meet the needs for critical mass adoption; only a subset of the population will find will connection in serving most of their needs.
3) Ehtics & Morale Code Gap — AI still cannot understand at a full cognitive level ethics & empathy to a degree that is required.
4) Trust and Compliance Gap — companies need to feel that their IP & privacy is protected; until this is corrected, AI will not be able to replace an entire back office and front office set of operations.
5) Security & Safety Gap — More safeguards are needed around AI to deal with hackers to ensure that information managed by AI is safe as well as ensure public saftey from any AI that becomes disruptive or hijacked to cause injury or worse to the public

Until these gaps are addressed; it will be very hard to eliminate many of today’s government, office/ business positions. The greater job loss will be in the lower skill areas like standard landscaping, some housekeeping, some less personable store clerk, some help desk/ call center operations, and some lite admin admin roles.

Continue reading “Yes, robots will steal our jobs — but don’t worry, we’ll get new ones” »

Feb 10, 2016

CBS News investigation: Liquid biopsy giving false sense of security about cancer risk?

Posted by in categories: biotech/medical, security

Not good — CancerIntercept Detect and Monitor test is not providing accurate information in some results. The cancerIntercept test whole concept was to detect a growing tumor in the body, before the patient may notice symptoms — acting like a cancer stethoscope for detecting and monitoring cancer.


Pathway Genomics claims its liquid biopsy can detect cancer before patient shows symptoms — but expert says that promise is “years away”.

Read more

Feb 8, 2016

Hackers publish FBI employees‘ contact info

Posted by in category: security

Dangerous; now they’re a target.


Hackers, making good on a threat, published contact information for 20,000 FBI employees Monday afternoon, just one day after posting similar data on almost 10,000 Department of Homeland Security employees.”

Read more