Security & Privacy

Legislation a Top Priority in Cybersecurity Fight Says RSA’s Coviello

Cybersecurity expert and RSA executive chairman Art Coviello says it's crucial for privacy advocates and industry leaders to come together to create modern laws to protect society from cybercrime. But the Cyber Intelligence Sharing and Protection Act, also known as CISPA and the Rogers-Ruppersberger Bill, was introduced in Congress in 2011. And while the House of Representatives has passed it twice, the bill still languishes in the Senate. In part two of a conversation recorded at Techonomy's recent Data Security Lab, Coviello talks about the responsibilities both of the government and of private companies that have suffered security breaches.   More

Security & Privacy

Is There a Hacker Hiding in Your Air Conditioner?

(Image via Shutterstock)

Hackers will try any point of entry they can find to access private data. In a recent interview with Techonomy, RSA Security’s Art Coviello said that the number of vulnerable access points—or what he calls the “attack surface”—is growing rapidly, with the number of digitally controlled devices connected to the Internet expected to reach 200 billion by the end of this decade. The New York Times reports that hackers recently breached the computer networks of a large oil company by implanting malware in the online menu of a Chinese restaurant favored by the company’s employees. With increasingly sophisticated hackers targeting a proliferating volume of corporate data, our pervasive connectivity—through everything from heating and cooling systems to accounting software and even vending machines—presents a constant challenge to security experts.   More

Security & Privacy

RSA’s Coviello: Opportunities for Cyberattack Multiplying

On top of the more than 2.4 billion people using smartphones, tablets, and PCs, another 1 billion devices—including sensors, card readers, and vending machines—currently access the Internet. But by the end of this decade some 200 billion items will be connected to the Internet and digitally controlled, predicts Art Coviello, executive chairman of RSA, the security division of EMC. The attack "surface," as Coviello calls it—meaning the range of potential points of entry for cyber criminals—will grow vast. At our recent Data Security Lab Techonomy's David Kirkpatrick talked to security veteran Coviello about changes in the industry, emerging risks, and what kind of leadership and governance we need to address them.   More

Business Security & Privacy

BlackBerry CEO Chen: Security Is Key to Comeback

BlackBerry CEO John Chen, who's been at the helm for just four months, has a looming task ahead of him—bring the once-booming brand back to its glory days. At Techonomy's recent San Francisco dinner salon, Chen talked with us about the future of BlackBerry, citing its security systems as one key way the company can turn itself around. "It's the most secure mobile environment," Chen said. "Today in this world of security complexity, people are not only stealing the data but they're modifying the data. It's an enormous opportunity."   More

Security & Privacy

A Privacy Bill Should Impose Consequences

(Image via Shutterstock)

Lamenting a fast-approaching privacy crisis in the U.S., New York Times op-ed columnist Joe Nocera this week reports what experts say should be included in a Consumer Privacy Bill of Rights, should Congress be so inclined to draft and pass one. Nocera suggests that not just consumers, but also companies in the business of collecting their data—including Google, Facebook, and Acxiom—stand to benefit from regulation; after all, he writes, credit card companies objected to the 1967 Truth in Lending Act that turned out to be to their advantage because it "showed consumers, for the first time, that they had some protection from fraud or shady practices." Nocera's conclusion: "Sometimes, government has to save business from itself."   More

Cities Digital Security & Privacy

Techonomic Top 5: Web Fightback, #BangkokShutdown, Sochi Tech, and More

The_Day_We_Fight_Back_-_banner

Every week we spotlight techonomic happenings on the Web and beyond, picking people, companies, and trends that exemplify tech’s ever-growing role in business and society. Here’s what’s got our attention. The Day We Fight Back, Tuesday’s anti-spying Web protest, rallied more than 6,000 websites against government surveillance—among them, Internet heavyweights Google, Mozilla, Reddit, and Tumblr. Protest participants hosted a banner on their sites, linking visitors to legislators to encourage them to take action. “Dear internet, we’re sick of complaining about the NSA,” the banner read. “We want new laws that curtail online surveillance.”   More

Security & Privacy

Could Privacy Become a New Form of Currency?

It's becoming increasingly clear that the latest digital technology is killing privacy. As Robert Scoble said at our latest Ericsson and AT&T hosted FutureCast event at the AT&T Foundry in Palo Alto, the future will be dominated by surveillance technologies like sensors, wearable computing, and location data. So, I asked California's Lieutenant Governor, Gavin Newsom what, exactly, does the end of privacy mean from the perspective of a politician? Newsom was refreshingly blunt. "We never had it," he replied. "So it's like welcome to my world."   More

Digital Security & Privacy

Report: Internet Is Faster, More Susceptible to Attack

(Image via Shutterstock)

Internet speeds around the world are up, but so are cyber-attacks, says Akamai in its latest “State of the Internet” report. Released quarterly by the Massachusetts-based content delivery network Akamai Technologies, the report analyzes global statistics on key indicators of Internet connectivity. Findings from 2013’s third quarter disclosed some good news, showing upward trends in both global connection speeds and broadband adoption rates, but also warned of long-term growth in attack traffic—a majority of it coming from China, Indonesia, and the United States.   More

Business Learning Security & Privacy

This Week’s Techonomic 5

A still from "Koyaanisqatsi."

Welcome to the first installment of our Techonomic 5, a brand-new series spotlighting techonomic happenings from around the Web and beyond. Every two weeks, our editorial team shares its picks of the top people, companies, and trends that exemplify tech's ever-growing role in business and society. Here's what's grabbing our attention: tech curriculums, Canadian data security, apps for mindfulness, the rise of Netflix, and Kayaanisquatsi director Godfrey Reggio.   More

Government Security & Privacy

Investigate NSA to Avert Police State, Privacy Consultant Warns

(Image via Shutterstock)

Cyber-security expert Jody Westby calls “for the facts to be found out and the truth to be determined” about the NSA surveillance program in order for the nation’s leaders to make “informed decisions about how this country should be operating and the values it should be upholding in the digital age—before it turns into a full police state.” Under the headline, "It Is a Scandal That No One is Investigating the NSA," Westby, who is CEO of Global Cyber Risk, a fellow at the Carnegie Mellon CyLab, and adjunct professor at Georgia Institute of Technology, as well as a frequent Techonomy participant, proclaims in a Forbes essay this week that she is stunned that no one but she has called for a full investigation.   More

Business Security & Privacy

Cybersecurity Startups Aim to Anticipate Attacks

(Image via Shutterstock)

In the cybersecurity world, the term "antivirus" is out of favor. ("McAfee" is even more so, thanks to its namesake's behavior, but that's another story.) Software and firewalls designed to detect and eradicate viruses on your system or business network—such as what Symantec, McAfee (now known as Intel Security), Cisco, and Check Point provide—still leave customers vulnerable to attacks, according to Nicole Perlroth's report in the New York Times.   More

Security & Privacy

Ray Kelly’s Tech-Centric War on NY Crime

12a645b

In the waning days of Bloomberg's New York, I threaded my way past multiple checkpoints and up a private elevator in Police headquarters to visit Ray Kelly, who leaves office December 31 along with the mayor. I wanted to understand how he'd used tech during his 12 years as Commissioner of Police, during which city crime dropped 40%. "When the administration came in, this department was the world's largest user of carbon paper and whiteout," is the first thing Kelly said. His apocryphal claim foreshadowed the rest of the interview.   More

Business IoE Life Science Security & Privacy

People, Companies, and Trends: Techonomy’s 2013 Top Ten

Eri Gentry at Techonomy 2013. (Photo: Asa Mathat)

As 2013 winds down, Techonomy takes a moment to look back on highlights from the year, especially those that portend—we think—the future. Our Top Ten list recognizes the people, companies, and ideas that embodied how technology is catalyzing change in business and society. Some of the individuals and organizations here were represented at our 2013 conferences, labs, and dinners, where we convene leaders to explore the biggest tech-driven challenges and opportunities. Some were featured in our expanding online editorial content.   More

Security & Privacy Techonomy Tucson

Why Microsoft’s Craig Mundie Worries About Weapons of Mass Disruption

David Kirkpatrick (l) and Craig Mundie. (Photo by Asa Mathat)

All the evils that can be done in the cyberworld fall into five categories, according to Craig Mundie: malicious mischief, crime, espionage, warfare, and terrorism. And there are three kinds of actors committing them: amateurs, pros, and governments. It’s a taxonomy that he says the industry only invented in recent months to give clarity to discussions about how to deter and defend against attacks. Techonomy’s David Kirkpatrick interviewed Mundie on stage at Techonomy 2013 in Tucson this week about cyber-insecurity and its impact on business.   More

Techonomy 13 Security & Privacy Techonomy Tucson Video

Cyber-insecurity and Its Impact on Business

U.S. companies are losing client confidence and trust as news of ongoing surveillance programs and continued security breaches dominate headlines and water-cooler conversations. What can they do, what must they do, to combat customer and public skepticism while strengthening protections and security for users and themselves? Microsoft's Craig Mundie and Techonomy's David Kirkpatrick discuss. Watch video and read the full transcript here.   More

Techonomy 13 Security & Privacy Techonomy Tucson Video

Is the Internet For or Against You?

The data you generate on- and off-line about what you watch and look at, buy, borrow, even what ails you, is tracked, quantified, packaged and sold. Your virtual self and your reputation are being qualified, commoditized and monetized. The dystopian critique is gaining adherence, from novelists to heads of state worldwide. If someone is making money from this info, shouldn’t you? James Cham of Bloomberg Beta, Accenture's Dan Elron, Reputation.com's Michael Fertik, Andrew Keen of Digital Vertigo, and shopkick's Cyriac Roeding discuss. Watch video and read the complete transcript here.   More

Business Security & Privacy

Why a Drone-Dominated World Will Demand Interdisciplinary Policymaking

credit: karen axelrad via flickr

Global headlines this week are focused on U.S. military drone attacks in Pakistan. But a conference in New York last weekend addressed the myriad additional policy implications of a consumer-drone-dominated world. Wish you could have been a fly on the wall for the first-ever Drones and Aerial Robotics Conference (DARC)? In a podcast broadcast by Drone U on Slate, meeting co-chair Christopher Wong, executive director of the Engelberg Center on Innovation Law & Policy at the New York University School of Law, recaps the top issues on the table there.   More

Digital Global Tech Security & Privacy

“Good Hackers” Gather in Washington to Help Besieged Journalists

FreedomHack in session.

Developers, activists, and journalists gathered in a Washington startup incubator on a recent weekend for “FreedomHack,” to build digital products to aid citizen journalists in Mexico. Reporters Without Borders reports that a skyrocketing number of them have been killed, attacked, or threatened in Mexico since 2010.   More

IoE Security & Privacy

More Connected Worlds May Threaten Personal Security

Image via Shutterstock

What will happen when hackers break into the “Internet of Things”? A growing number of Internet-connected home devices are hitting the market, but two security researchers are warning consumers of potential security breaches, according to MIT Technology Review. These new remotely-managed devices offer convenience and potential energy savings—but are they worth it?   More

Global Tech Security & Privacy

Watching Walmart Parking Lots from Space: New Apps for Satellites

Skybox Imaging mini-fridge-sized satellites sit in the company's clean room.

Here's a new barometer for measuring a technology's disruptive potential: "If there's not a capacity to exploit something for evil, it's probably not that revolutionary." That's one way 27-year-old Skybox Imaging co-founder Julian Mann explains to the Atlantic this week the transformative uses for the 200-pound, mini-fridge-sized satellites that his company intends to start launching into orbit next month.   More