Raphael Kyle Caoile Manansala discusses how since its 2014 iteration of iOS, also known as iOS 8, Apple has taken an unprecedented step of introducing full-disk encryption as a feature dubbed as Data Protection when an iPhone user sets a passcode lock. This pioneered the idea in Silicon Valley that the data on smart technology devices like the iPhone belonging to its users. Apple has been known for its attention to detail. As we further explore its design decisions, we will see just how Apple took careful considerations in making decisions based on the security and privacy of its customers.
Read MoreInternet of Things (IoT)
IoT and SCADA Risk
Alex Osuch discusses the emerging risk associated with the new systems of automation and networked devices becoming embedded in the critical energy sector’s infrastructure. The nation’s energy infrastructure is becoming increasingly connected and continues to converge, producing new kinds of vulnerabilities and areas of exposure, including in the realm cybersecurity. This paper examines advanced metering, substation automation, and nation-state risks in the smart grid.
Read MoreThe Internet of Things: A Dark Precursor
Kyle McNulty explores the growing risks associated with the spreading web of internet-enabled devices across consumers’ lives. The explosive proliferation of Internet-connected devices has resulted from rapid progress in technology and expanding demand for internet-connected capabilities from consumers. However, this technological advancement and consumer behavior has also created a significant vulnerability
Read MoreThe Airline Industry’s Internet of Things Risks
Kyle Simpson discusses the Internet of Things (IoT) and the airline industry's unusually slow implementation of IoT applications. In defense of this caution, the paper outlines some potential areas of innovation leveraging the IoT for the airline industry, while highlighting the corresponding risks.
Read MoreArrayent’s Inherent Risks
Kyle Simpson discusses the operational risks of Arrayent, an Internet of Things (IoT) cloud service company that manages dozens of large companies including Whirlpool, Maytag, Liftmaster, and Febreeze. This paper examines these potential risks, and then makes recommendations for risk mitigation and best practices.
Read MoreSmart Homes: Evaluating Risks and Being Smart in the SmartHome Revolution
Mikhail Savvateev discusses the emerging risks associated with the “Smart Home” technological advances that are becoming increasingly ubiquitous across the human experience. The author examines how these new technologies have created new security and other technological system risks, and provides some suggestions for industry participants.
Read MoreThe Harmonious Blend of Policy and Technology: The Need for an IoT Compliance Framework
Andy Herman discusses the rising concerns associated with the Internet of Things, and the lack of a comprehensive cybersecurity compliance framework. The rising number of internet-connected devices has created increasing number of cybersecurity risks, as network of devices are hijacked for malicious purposes.
Read MoreNew Age of Cybersecurity: Rethink Cybersecurity Strategies and Implementation
Cory Shyu discusses how the Internet of Things (IoT) has transformed the technology sector profoundly. While companies are rushing to reap benefits from increased productivity and automation by adopting more agile technology solutions, privacy and security issues have risen at an alarming rate. The author addresses the key areas in which companies should rethink cybersecurity strategies and develop appropriate roadmaps to achieve security objectives.
Read More