Tag Index  /  Showing 1 - 14 of 14 results for “security”

Analytics & Data Finance Security & Privacy

The Fin-ternet of Things: Connecting Everything Means Rethinking Money

The coming world of the Internet of Everything means driverless cars making per-minute toll payments, lightbulbs that pick an energy vendor, IP royalties paid by devices themselves in real time, and investment decisions made by robo-advisors. This more efficient world will mean changes for banks, investment, and the way all of us live.   More

Security & Privacy

Hello Barbie Hijacked, as Techonomy 2016 Foreshadowed

At Techonomy 2016, panelists revealed shocking security risks associated with embedding the internet in children’s toys. The fear that these devices could be compromised appears to have been warranted. Over the past year, hackers have found a way to turn "Hello Barbie" into a listening device, and have held data ransom. Germany has even banned certain connected toys in their country.   More

Business

Snowden the Disruptor

Barton Gellman on security and privacy at Techonomy 2014.   More

Security & Privacy Society Video

How AI and The Blockchain can Build Trust

Chief Technology & Innovation Officer at Accenture and Techonomy speaker Paul Daugherty shares his thoughts on Artificial Intelligence and the Blockchain during the World Economic Forum. Plus, a panel discussion on AI's impact on society hosted by David Kirkpatrick.   More

Managing Security & Privacy

Why Blockchains are For Every Company

The advent of the blockchain is much like the arrival of the Web. It will disrupt technology, society and business. What is today in a database will tomorrow be in a blockchain. Leaders who want to take advantage of this breakthrough need to understand several key points.   More

Internet of Things Security & Privacy

Why We Can’t Use Things to Secure the Internet of Things

Marc Andreessen first famously wrote “software is eating the world” five years ago, and now software is transforming entire industries. But when it comes to securing digital transactions, the world mostly still relies on hardware. But as we we all transact more and more through connected devices, this hardware way of securing mobile commerce simply won't suffice.   More

Global Tech Internet of Things

Post-CES, Four Questions about the Internet of Things

Connected refrigerators, bras that monitor your heart rate, and, of course, autonomous vehicles were the kinds of things CES attendees focused on this year. It now seems inevitable that more or less everything will eventually be connected, and that raises new security, business, and technical questions for manufacturers, network providers, marketers, and consumers– the IoT ecosystem. What a few days scrambling around Las Vegas got me thinking.   More

Global Tech Security & Privacy

Rhetoric Eases, but Troubles Remain in Alibaba Piracy Spat

After reaching a fever pitch last week, rhetoric in the high-profile spat over piracy between e-commerce giant Alibaba and one of China’s main business regulators appears to be softening as the two sides move towards a compromise. The latest headlines say Alibaba and the State Administration For Industry And Commerce (SAIC) have joined hands to fight piracy, marking a sharp toning down of the angry rhetoric that was flying for much of last week.   More

Business Security & Privacy

BlackBerry CEO Chen: Security Is Key to Comeback

BlackBerry CEO John Chen, who's been at the helm for just four months, has a looming task ahead of him—bring the once-booming brand back to its glory days. At Techonomy's recent San Francisco dinner salon, Chen talked with us about the future of BlackBerry, citing its security systems as one key way the company can turn itself around. "It's the most secure mobile environment," Chen said. "Today in this world of security complexity, people are not only stealing the data but they're modifying the data. It's an enormous opportunity."   More

Security & Privacy

Ray Kelly’s Tech-Centric War on NY Crime

In the waning days of Bloomberg's New York, I threaded my way past multiple checkpoints and up a private elevator in Police headquarters to visit Ray Kelly, who leaves office December 31 along with the mayor. I wanted to understand how he'd used tech during his 12 years as Commissioner of Police, during which city crime dropped 40%. "When the administration came in, this department was the world's largest user of carbon paper and whiteout," is the first thing Kelly said. His apocryphal claim foreshadowed the rest of the interview.   More

Business Security & Privacy

Why a Drone-Dominated World Will Demand Interdisciplinary Policymaking

Global headlines this week are focused on U.S. military drone attacks in Pakistan. But a conference in New York last weekend addressed the myriad additional policy implications of a consumer-drone-dominated world. Wish you could have been a fly on the wall for the first-ever Drones and Aerial Robotics Conference (DARC)? In a podcast broadcast by Drone U on Slate, meeting co-chair Christopher Wong, executive director of the Engelberg Center on Innovation Law & Policy at the New York University School of Law, recaps the top issues on the table there.   More

Internet of Things Security & Privacy

More Connected Worlds May Threaten Personal Security

What will happen when hackers break into the “Internet of Things”? A growing number of Internet-connected home devices are hitting the market, but two security researchers are warning consumers of potential security breaches, according to MIT Technology Review. These new remotely-managed devices offer convenience and potential energy savings—but are they worth it?   More

Bio & Life Sciences

What Would You Do If Hackers Downloaded Your DNA?

Hacked customer accounts are a bane of modern existence. LivingSocial might have been the latest major hack victim, but by now, most people with any kind of online life know what to do when notified by a vendor, bank, or e-commerce site that "unauthorized access to some customer data" has occurred: reset your passwords, check your bank accounts, monitor your credit report, perhaps freeze your credit or cancel your credit cards. But what if hackers access your DNA? There's no resetting that code.   More

Security & Privacy

With Mobile the Future, How Does a Company Stay Secure?

A PC, Mac, iPad, Android, BlackBerry, and Nexus 7 all sit on Sam Curry’s desk one afternoon while he works from home. Though not everyone has access to such a range of mobile devices, this lineup offers a glimpse at the diversity of devices people now use to work. Curry is CTO of Identity and Data Protection at RSA, a firm specializing in information security. During a phone call last week, he said that all the devices on his desk provide connectivity for his work at RSA, each with its own unique set of capabilities and limitations.   More