Tag Index  /  Showing 1 - 10 of 10 results for “security”

Managing Security & Privacy

Why Blockchains are For Every Company

The advent of the blockchain is much like the arrival of the Web. It will disrupt technology, society and business. What is today in a database will tomorrow be in a blockchain. Leaders who want to take advantage of this breakthrough need to understand several key points.   More

Internet of Things Security & Privacy

Why We Can’t Use Things to Secure the Internet of Things

Marc Andreessen first famously wrote “software is eating the world” five years ago, and now software is transforming entire industries. But when it comes to securing digital transactions, the world mostly still relies on hardware. But as we we all transact more and more through connected devices, this hardware way of securing mobile commerce simply won't suffice.   More

Global Tech Internet of Things

Post-CES, Four Questions about the Internet of Things

Connected refrigerators, bras that monitor your heart rate, and, of course, autonomous vehicles were the kinds of things CES attendees focused on this year. It now seems inevitable that more or less everything will eventually be connected, and that raises new security, business, and technical questions for manufacturers, network providers, marketers, and consumers– the IoT ecosystem. What a few days scrambling around Las Vegas got me thinking.   More

Global Tech Security & Privacy

Rhetoric Eases, but Troubles Remain in Alibaba Piracy Spat

After reaching a fever pitch last week, rhetoric in the high-profile spat over piracy between e-commerce giant Alibaba and one of China’s main business regulators appears to be softening as the two sides move towards a compromise. The latest headlines say Alibaba and the State Administration For Industry And Commerce (SAIC) have joined hands to fight piracy, marking a sharp toning down of the angry rhetoric that was flying for much of last week.   More

Business Security & Privacy

BlackBerry CEO Chen: Security Is Key to Comeback

BlackBerry CEO John Chen, who's been at the helm for just four months, has a looming task ahead of him—bring the once-booming brand back to its glory days. At Techonomy's recent San Francisco dinner salon, Chen talked with us about the future of BlackBerry, citing its security systems as one key way the company can turn itself around. "It's the most secure mobile environment," Chen said. "Today in this world of security complexity, people are not only stealing the data but they're modifying the data. It's an enormous opportunity."   More

Security & Privacy

Ray Kelly’s Tech-Centric War on NY Crime

In the waning days of Bloomberg's New York, I threaded my way past multiple checkpoints and up a private elevator in Police headquarters to visit Ray Kelly, who leaves office December 31 along with the mayor. I wanted to understand how he'd used tech during his 12 years as Commissioner of Police, during which city crime dropped 40%. "When the administration came in, this department was the world's largest user of carbon paper and whiteout," is the first thing Kelly said. His apocryphal claim foreshadowed the rest of the interview.   More

Business Security & Privacy

Why a Drone-Dominated World Will Demand Interdisciplinary Policymaking

Global headlines this week are focused on U.S. military drone attacks in Pakistan. But a conference in New York last weekend addressed the myriad additional policy implications of a consumer-drone-dominated world. Wish you could have been a fly on the wall for the first-ever Drones and Aerial Robotics Conference (DARC)? In a podcast broadcast by Drone U on Slate, meeting co-chair Christopher Wong, executive director of the Engelberg Center on Innovation Law & Policy at the New York University School of Law, recaps the top issues on the table there.   More

Internet of Things Security & Privacy

More Connected Worlds May Threaten Personal Security

What will happen when hackers break into the “Internet of Things”? A growing number of Internet-connected home devices are hitting the market, but two security researchers are warning consumers of potential security breaches, according to MIT Technology Review. These new remotely-managed devices offer convenience and potential energy savings—but are they worth it?   More

Bio & Life Sciences

What Would You Do If Hackers Downloaded Your DNA?

Hacked customer accounts are a bane of modern existence. LivingSocial might have been the latest major hack victim, but by now, most people with any kind of online life know what to do when notified by a vendor, bank, or e-commerce site that "unauthorized access to some customer data" has occurred: reset your passwords, check your bank accounts, monitor your credit report, perhaps freeze your credit or cancel your credit cards. But what if hackers access your DNA? There's no resetting that code.   More

Security & Privacy

With Mobile the Future, How Does a Company Stay Secure?

A PC, Mac, iPad, Android, BlackBerry, and Nexus 7 all sit on Sam Curry’s desk one afternoon while he works from home. Though not everyone has access to such a range of mobile devices, this lineup offers a glimpse at the diversity of devices people now use to work. Curry is CTO of Identity and Data Protection at RSA, a firm specializing in information security. During a phone call last week, he said that all the devices on his desk provide connectivity for his work at RSA, each with its own unique set of capabilities and limitations.   More