The Evolving Role of the CISO: From Risk Manager to Business Enabler
One of the first things I do in my role as chief security officer is reach out to the heads of other departments to find out how I can integrate myself into their operations. In one more extreme...
View ArticleThere’s No Such Thing as an “IoT Strategy”
I recently warned business executives and board members of the three myths of the Internet of Things, why aligning cybersecurity with those myths can be detrimental to your organization, and how to...
View ArticleIoT is the Eyes and Hands of the Cloud
Inflection points often become inflection points because of the convergence–sometimes planned, sometimes serendipitous–of multiple factors. It happened with the ascent of air travel, television,...
View ArticleDon’t Short-Change IoT Security
When we talk about the Internet of Things, it’s easy to get swept away by the sheer magnitude of the IoT market opportunity. After all, the numbers are enormous. More than 20 billion connected things...
View ArticleThe 6 D’s of Exponential Growth: How and When Cybersecurity Will Become Abundant
This year, I have been fascinated by two books about the near future and how entrepreneurs should think about market opportunities. “Abundance” by Peter Diamandis and Steven Kotler, and “Exponential...
View Article3 Cybersecurity IoT Myths
This is not an article about why the Internet of Things is a big business opportunity. You already know that. Nor is it going to be about the fact that IoT initiatives need to account for cybersecurity...
View ArticleTrust in Healthcare goes beyond the physical
The concept of zero trust has gained a lot of interest and traction among cybersecurity professionals, and for good reason. As threat vectors expand and the ingenuity of bad actors increases, the...
View Article6 Degrees of IoT: The Kevin Bacon Theory of Networking
You don’t need to be a student of American cinema to know what the movies “Animal House” and “A Few Good Men” have in common: Kevin Bacon. Most, if not all, of us have heard about the Six Degrees of...
View ArticleThe Keys to Unlocking the Potential of AI in Health Records
Healthcare is one of the industries that stands at the forefront of reaping dramatic and demonstrable benefits from the increased use of artificial intelligence. AI offers real potential to save lives...
View ArticleWant a Secure IoT Experience? Automate, Automate, Automate
OK, let’s get the blah-blah-blah out of the way. IoT is a huge market opportunity. It is transforming how data is created, captured, and harnessed for business advantage. Tens of billions of smart...
View ArticleRemember That IoT Is Physical—Not Cyber
Business executives and board members are understandably excited—perhaps even giddy—about the potential for huge business upsides resulting from new Internet of Things (IoT) projects. And why not?...
View ArticleEdge Computing Is a Big Deal—Are You Ready for It?
I’m willing to bet my membership in Futurists Anonymous that at least one of your technology executives—CISO, CIO or CTO—has uttered the words “edge computing” in your executive staff meetings or...
View ArticleAdopting Private 5G Networks? Now, Think Security.
This is the second article in a two-part series on private mobile networks. Part one is about knowing your acronyms. The next industrial revolution, aka Industry 4.0, is on the horizon. Enterprises...
View ArticleHealth Care and IoT Security: Your Devices Need a Physical
A robot performs surgery, operated by a doctor who is miles away; a patient swallows a pill containing a monitor that scans the digestive system; even humble stethoscopes and blood-pressure cuffs...
View ArticleSmart Cities Are Exciting—Until There’s a Cybersecurity Snafu
The ideas behind “smart cities” are becoming more relevant as leaders in government and business seek innovative ways to respond to the global COVID-19 pandemic. A recent article in Wired described...
View ArticleFrom Doorbells and Fish Tanks to Nuclear Reactors: Why Focus on IoT Security
As the world grows ever more connected, all our devices are becoming linked together. The activity tracker on my wrist wirelessly uploads data to my smartphone, which in turn controls entertainment...
View ArticleThe Myths of IoT Security
Conventional thinking about cybersecurity focuses on a basic concept: lock down every computing device in sight in order to keep out hackers, attackers and thieves. However, in a highly connected...
View ArticleThe Only Way to Secure the IoT Is Zero Trust
Smart toasters, washing machines that can tell the future, and Siri. The Internet of Things is so much more than simply billions of connected things. IoT is about critical infrastructure, like traffic...
View ArticleHow to Not Fail at Digital Transformation
Digital transformation – or what I like to call DX – is a buzzword that we all love to use in our discussions around business outcomes and innovation. But what does it really mean? Broadly, it’s the...
View ArticleHow to Secure IoT in Financial Services?
The financial services sector is attractive to cyber thieves for one obvious reason—access to funds and related data—and one less obvious—security vulnerabilities around the Internet of Things. The...
View Article
More Pages to Explore .....