alt =""
Showing posts with label Internet of Things. Show all posts
Showing posts with label Internet of Things. Show all posts

Thursday, 5 November 2015

Web Summit 2015: The Tech World Musings From Dublin

Grown from the 400 attendees five years back to the current 22000 tech enthusiasts, the Web Summit 2015 continues to deliver innovative ideas and fascinating thoughts to the tech world gathered at the bustling RDS venue, Dublin.

Cars and technology took the center stage on day 2. Augmented reality, Virtual Reality, Drones, and Wearables were also some of the key highlight topics that seized the audience attention on day 2. Check out some of the most interesting tech talks from day 2 at Dublin. Ford chief executive Bill Ford, pointed out the promising intersection between cars – an industry that has been “revolution- resistant for a hundred years” - and technology. He added that Ford is redefining itself as a “mobility company” with an interest in autonomous driving, net-connected cars along with data collection and analytics. Sean Rad of Tinder, the CEO of location- based dating app highlighted about the data that drives it and the future of the platform. On a lighter note, he added that the Irish user base was extremely active on the app.

Web summit

The most exciting part of day 2 was the live demonstration of a drone that flew into the center stage by Randy Braun of DJI- a World Leader in Camera Drones/Quadcopters. The tech enthusiasts including me curiously heard that DJI along with Humanitarian UAV Network uses their drones or Unmanned Aerial Vehicles UAV’s for a wide range of humanitarian and development settings. Google showcased its famous virtual reality platform ‘Google Cardboard’, basically a cardboard case for smartphones that works in conjunction with compatible apps for projecting 3D images or videos. The wonders of the virtual reality did not ended with Google’s Cardboard. Columbian company Protesis Avanzadas showcased a 3D robotic prosthetic hand, an affordable multifunctional prosthetic hand that can replicate many of the grip patterns of the human hand, in the summit center stage. The Head of Adtech at Facebook, Dave Jakubowski took to the Marketing Summit- the state of the industry, FOMO (Fear of Missing Out) in the digital age.

All the tech talks surrounding Virtual Reality, Augmented Reality and Machine Learning reminds us that we are swiftly moving into an age of transformation, where the bridge between the digital and the real world slowly blurs out. All these technology advancements also hold the great potential to redefine the existing business models. As a part of a digital transformation company Happiest Minds, which is strongly focused on the new age disrupting technologies including IoT, Big Data, M2M Learning, Cloud and Mobility, I strongly feel that very interesting days are coming ahead in terms of technology as well as the customer experience.

Anticipating more exciting and insightful talks and demos from the Web Summit 2015 stage, on the closing day, 5th of November. Stay tuned.

Wednesday, 4 November 2015

5 Drivers for Securing The Internet of Things

If you have any doubt at all about the impact of the IoT, consider these facts: 75 percent of the world’s population has access to a mobile device. When you compare the number of connected devices in 2009 (0.9 billion) to the number today, it represents a 30-fold increase. It is estimated that over 26 billion devices will be connected to the internet by 2020.

Along with the massive growth of IoT is the growth of corresponding security issues. As connected devices increase, so does the amount of data generated and transferred by these devices. As more data is transferred, the number of pathways and parameters for the cyber criminal to exploit also increases. It all adds up to the need for more protection than ever before.
Internet of Things, IoT, IT security, IT security strategy, CISO,
Vital role of the CISO

As the world of IT security transforms to meet this exponential growth, the role of the CISO becomes vital in terms of defining the IT security strategy.

Before IoT, the IT and Operational Technology (OT) layer were controlled and secured differently; IT security focused on the confidentiality of data and network infiltration, while OT security emphasized physical security, safety and business continuity. Now that more devices are connected to the internet, the OT layer has become increasingly IP enabled, making it more vulnerable. Traditional security models must adapt, and the CISO must create a unified IT security strategy.

Attention to the following key drivers will assist the smart CISO with devising a strategy that truly works in securing the IoT:

1. Layer visibility. The OT layer, the IT layer and any other layers of the network should have visibility and be encompassed by an overall, unified security plan of action. No layer or device should be exempt.

2. Threat visibility. New devices mean new loopholes and threat vectors. A sound strategy should take into account not only existing vulnerability, but potential vulnerability, as soon as a device is connected to the network. A real-time threat assessment and definition that works around the clock is key to preventing new attacks.

3. Platform visibility. The creation of a monitoring apparatus that is agnostic is vital in today’s software platform environment of continuous updates, open source and self-imposed redundancy.

4. Network encryption. Point-to-point and point-to-multipoint encryption should be based on network segments, network protocols and network flows. In other words, internal networks in their entirety must be encrypted to ensure security long term.

5. Automated remediation. The end-goal of IoT security should be an approach that requires no human intervention. Automated, immediate security control utilizing machine-to-machine intelligence is a key to not only a successful, but also cost-effective unified security strategy.
IoT growth poses challenges for the forward-thinking CISO as scale increases, scope broadens and the need for cohesive cooperation increases. Those who consider the above drivers can develop a security strategy that will address these challenges and pave the way for the organization to take advantage of the opportunities the IoT also brings.