Abney and Associates
2 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Terry Spenser
Scoop.it!

Google's Nest kopen zal dwingen een Internet van dingen privacy debat

Google's Nest kopen zal dwingen een Internet van dingen privacy debat | Abney and Associates | Scoop.it
Terry Spenser's insight:

Deze morgen, zoals ik was het schrijven van deze blogpost, kreeg ik een e-mail van een van mijn collega's, zeggen "Is het raar dat aangezien Google Nest kocht, ik wil niet langer een?" Haar sentiment is niet dat ongebruikelijk, omdat, zo blijkt, veel mensen het gevoel dat Google + Nest = HAL. (Het is moeilijk te missen de gelijkenis).

Mijn collega Frank Gillett onlangs een bericht waarin een verzameling van tien belangrijke gedachten over de acquisitie. Als de privacy-identiteit-persoonlijke gegevens wonk adviseren van Forrester marketing strategie cliënten, ik dacht dat ik zou inzoomen op enkele van de meer saillante punten voor deze kwesties.

Het spreekt vanzelf dat Nest Labs mainstream huisautomatisering beter dan de meeste andere bedrijven hebben bedacht. Maar tot op heden nog niet had het bedrijf een sterke identiteitsverificatie ingebouwd in haar diensten. Dat betekent bijvoorbeeld dat mijn partner en ik verschillende temperatuur voorkeuren die Nest automatisch implementeert als we zowel home - maar in verschillende kamers kunnen niet ingesteld. Door Google verificatie en identiteit het protocol voor het delen van gegevens, voorkeuren en machtigingen over deze apparaten - deel van wat wij persoonlijke identiteitsbeheer noemen - zal dit binnenkort een realiteit.

De volgende stap? De mogelijkheid om te verlenen anderen (bv: gasten of huis sitters) tijdelijke toegang tot uw Nest, hotels met Nest technologie ingebouwd in hun kamers, en zelfs algoritmisch geoptimaliseerd klimaten op basis van de werkelijke mensen in een bepaalde kamer. De vangst? In orde voor de consument om te profiteren van deze diensten, zullen ze moeten hebben een Google-ID verbonden met hun mobiele en/of draagbare apparaten. Dat is een grote overwinning voor het internet reus, en geeft het een been in de race om te bouwen van de databank van affiniteit.

Ondertussen, ik vermoed dat Google zal voudig Nest in de Robotica en AI divisies. (Vergeet niet, Nest denkt van zichzelf als een robotica bedrijf, en zijn VP van technologie is een gerenommeerde neurotici en robotica onderzoeker.) Het samenbrengen van deze teams kunnen Google de basis leggen voor verbonden huizen. We hebben Android OS draaien op de meeste van onze aangesloten apparaten, GoogleHub als het "master systeem" waarop al onze toestellen zijn ingeschreven, GoogleNow helpt ons plannen en optimaliseren onze elk moment en elke persoonlijke ruimte, en zelfs een GoogleBot eigenlijk het uitvoeren van taken. Dit zal niet gebeuren morgen, of zelfs volgend jaar, maar Google heeft eindelijk een goed aangenomen consument apparaat om te beginnen met het testen van scenario's met, en verzamelen van echte gebruikersgegevens over wat werkt en wat niet.

Natuurlijk, dit alles brengt ons bij de olifant in de kamer: eenmaal Google is ingesloten in onze huizen, een hele nieuwe host voor privacykwesties ontstaan. Google zal hebben te nemen een volledig andere benadering van persoonlijke levenssfeer dan elke andere onderneming daar. Waarom? Want zij nu toegang tot meer contexten - identiteit hebben en ruimtelijke, voornamelijk - dan iedereen ooit heeft. Er zijn talloze scenario's die ze nodig hebben om te behandelen, met inbegrip van:

• Als ik de eigenaar van een Nest ben, en ik houseguest, toegang tot mijn apparaat, die de geven "eigenaar" is van de gegevens die zij genereert? Heb ik het recht te controleren mijn gasten als ze rond mijn huis, gewoon lopen omdat ik heb hen toegang verleend tot mijn netwerk apparaat?
• Wat gebeurt er als bedrijven beginnen met het installeren van Nest thermostaten en sensoren? Hebben ze het recht om triangulate mijn smartphone of draagbare IP met de sensorgegevens? Wie is verantwoordelijk voor het definiëren van de juiste regels hier?
• Hoe lang moet dit soort superfijne-korrel locatiegegevens worden opgeslagen, en kan ik blokkeren de collectie, en/of hebben het recht te allen tijde verwijderen?
• Waar de gegevens moet worden opgeslagen? Lokaal, op een netwerk master apparaat, of in de enorme wolk servers van Google?

• Welke gebruikersidentiteit de "master box" voor het systeem is? Met andere woorden, als drie mensen zijn dezelfde kamer met verschillende temperatuur of verlichting, of muziekvolume of TV weergegeven voorkeuren, wie wint?

Uiteraard, alleen de tijd zal leren hoe Google zal zich bezighouden met deze kwesties, maar ik hoop echt dat ze Forrester contextuele Privacy onderzoek ter harte nemen, zoals zij deze systemen en producten ontwerpen. Het is de enige manier die zij ooit echt kunnen benutten van de enorme investeringen die ze in The Internet zult of Things maken.

Fatemeh Khatibloo is een Forrester-analyst die klant inzichten professionals serveert. Deze post werd oorspronkelijk gepubliceerd op Forrester blog netwerk. Gepubliceerd met toestemming.

more...
No comment yet.
Scooped by Terry Spenser
Scoop.it!

Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parents about teen social media

Abney & Associates Technology Updates: Sheriff’s forum to open eyes of parents about teen social media | Abney and Associates | Scoop.it

http://www.indystar.com/story/news/local/hamilton-county/2014/03/09/sheriffs-forum-to-open-eyes-of-parents-about-teen-social-media/6241003/

It started with a disagreement between friends at school. Then came threatening phone calls at home. Finally, taunting and name-calling on Facebook and Twitter.

By the end of a 24- to 48-hour period, Cara Cockerham had called the Fishers Police Department, and she had shut down her 13-year-old daughter’s Facebook page.

Although the incident happened three years ago, when her daughter was a seventh-grader, Cockerham said the memory is still fresh.

Her daughter, whom she does not want to identify, was being cyber bullied.

“A lot of the kids turned on her because she told her mom,” said Cockerham, 48, Fishers.

Parents can learn how to identify misuse of social media — from ways to prevent abuse to dealing with the aftermath of an incident — at the Hamilton County Sheriff’s Department’s free public education forum Monday. The Teen Social Media program will be from 7 to 8 p.m. at the Hamilton County 4-H Fairgrounds, 2003 E. Pleasant St., Noblesville.

“Parents need to just really look and listen. You need to be in the places where they go. And don’t be caught off guard,” said Hamilton County Detective Alex Petty, a father of four and a lead investigator for the Sheriff’s Department on social media. He will lead the forum, along with Detective Kija Ireland and technology specialist Zach SeRine.

Social media crimes have increased to more than 100 reported cases annually in Hamilton County. About 35 percent of children ages 13 to 18 have received a suggestive or highly explicit message, Petty said.

But more tools are becoming available to combat online bullying. Messages on Facebook, Twitter, cell texting and other electronic platforms now fall under laws related to bullying.

Indiana legislators passed a law last year placing greater responsibility on federally funded schools for bullying and cyber bullying incidents, on and off school property.

The law requires public schools for the first time to collect data on bullying. The Indiana Department of Education will release the information in August.

Sheriff’s Deputy Bryant Orem said Monday’s forum would open the eyes of parents and teens about the dangers of social media and networking.

“The majority of our young people are online every day, whether it is games, texting, smartphones or other technology. Many, if not most of them, do not realize the potential dangers and pitfalls that can occur from this use,” Orem said.

He said parents should know how to recognize warning signs of social media misuse, know best practices to use and talk openly with children about the dangers.

Orem said parents should begin talking to their kids about social media dangers as soon as they start using technology.

While providers offer filtering, tracking and other software applications, the best practice, Orem said, is “be a parent.”

“The parent pays for the technology, so don’t be afraid to check it or remove it if it is the best interest of your child,” he said. “Too many parents are overly concerned with being their child’s friend rather than being their child’s parent.”

Cockerham knows how important it is to be a parent.

Her best advice: “Be very, very active and attentive in their lives.”

Star reporter Eric Weddle contributed to this story.

Call Star reporter Betsy Reason at (317) 444-6049. Follow her on Twitter: @BetsyReason.

Teen Social Media forum

• What: Hamilton County Sheriff’s Department’s public education forum for parents and middle school-age children and older.

• When, where: 7 to 8 p.m. Monday, Hamilton County 4-H Fairgrounds, 2003 E. Pleasant St., Noblesville.

• Cost: Free.

• Good to know: Child care will be provided for preschool and elementary-age children.

• Info: http://www.hamiltoncounty.in.gov

• Other help: Project CyberSafe for Parents, at www.indy.gov

7 warning signs of social media misuse

• 1. Displaying risky behaviors.

• 2. Posting inappropriate materials, photos, blogs and comments.

• 3. Hiding or attempting to hide technology use from adults.

• 4. Referring to activity or drug use.

• 5. Creating false or misleading profiles.

• 6. Withdrawal or a change in friends or usual behavior.

• 7. Lower grades, depression or sudden health problems

6 best practices for parents

• 1. Check all technology devices on a frequent and regular basis.

• 2. Know the passwords for all your child’s accounts, including phone lock passwords.

• 3. Know and approve online friends.

• 4. Monitor activities and establish rules about what can be shared.

• 5. Talk to your kids.

• 6. Find more productive uses of time than your child spending time alone on a computer or phone.

5 tips for talking to your kids

• 1. Be open and approachable.

• 2. Explain your concerns.

• 3. Illustrate your talk with examples.

• 4. Talk about consequences; many colleges and employers do online searches as part of application processes.

• 5. Encourage your child not to be a bystander if they see something wrong.

Visit the world of internet technology and infotech update @
Abney and Associates PC Speak http://abneyassociates.org/
An Abney and Associates Internet and Technology Research Lab Articleshttp://abneyassociates.org/category/articles/

more...
No comment yet.
Scooped by Terry Spenser
Scoop.it!

Abney and Associates Internet Warning: Europäische Versicherer entdecken Sie Cyber-Schutz-Markt

Abney and Associates Internet Warning: Europäische Versicherer entdecken Sie Cyber-Schutz-Markt | Abney and Associates | Scoop.it
It's already a booming market in the United States, but in Europe, companies are also waking up to the idea of cyber insurance to protect themselves against Internet attack.
Terry Spenser's insight:

 Source: http://www.foxnews.com/world/2013/09/22/european-insurers-discover-cyber-protection-market/

 

Es ist bereits einem boomenden Markt in den Vereinigten Staaten, aber in Europa Unternehmen auch Wachen die Idee der Cyber Versicherung sich vor Internet-Angriffen zu schützen.

 

Und Versicherungen sind starkes Wachstum in den kommenden Jahren zu projizieren.

 

Auf der anderen Seite des Atlantiks, wo Unternehmen verpflichtet US-Behörden von online-Angriffen sind, ist der Cyber-Versicherungsmarkt bereits hoch entwickelt in Höhe von $1,3 Milliarden (960 Millionen Euro) pro Jahr, nach Christopher Lohmann, Leiter Deutschland und Zentraleuropa bei Allianz Global Corporate und Spezialität.

 

Europa ist noch ein langer Weg.

 

"Aber wir projizieren starkes Wachstum in den kommenden Jahren. Wir den Markt in Höhe von 700 Millionen Euro bis 2018 sehen", sagte Lohmann.

 

Für Unternehmen und Privatpersonen sind die Gefahren aus dem Internet sehr real, zwischen Daten und Identitätsdiebstahl und Spionage.

 

Unternehmen sehen ihre Infrastruktur gelähmt, ihre EDV-Systeme, die mit Viren und Malware infiziert.

 

Aber das sind nicht die einzigen Risiken: menschliches Versagen und interne Schluckauf können auch jam Systeme und Daten.

 

Erst letzten Monat war Mobilfunkbetreiber Vodafone das Opfer von massiven Datendiebstahl wo persönliche Informationen--einschließlich Bankverbindung--etwa 2 Millionen Menschen gestohlen wurde.

 

Und mit dem exponentiellen Wachstum der elektronischen Nachrichten und die zunehmende Übertragung von Unternehmen kommerzielle Verarbeitung und Speicherung von Daten auf cloud-computing, die Gefahren sind nur zu vermehren.

 

In Deutschland berichtet ein insgesamt 64.000 Handlungen von Internetkriminalität offiziell im Jahr 2012 rund 42 Millionen Euro Schaden, ein Plus von 7,5 Prozent gegenüber dem Vorjahr darstellt.

 

"Europa ist noch sehr viel hinter zu diesem"

Und das ist nur die Spitze des Eisbergs, sagen Experten, weil viele Unternehmen lieber in ihre Sicherheitssysteme über Verstöße gegen die Aussage verweigern.

 

"Europa immer noch sehr viel hinter," sagte Nicolas Helenon, Begründer der Versicherungsmakler NeoTech zugesichert.

 

"Großunternehmen bewaffneten sich gegen diese Risiken vor langer Zeit. Aber die meisten kleine und mittleren Unternehmen sind nicht versichert", sagte Helenon, argumentieren, dass viele Unternehmen gefunden, Cyber Risiken schwieriger zu begreifen, als, sagen, Feuer oder Wasserschaden.

 

"Die Bedrohung durch Cyberkriminalität ist in erster Linie ein Problem für Unternehmen, die eine große Datenmenge Client verwalten", sagte Philipp Lienau bei HDI-Gerling.

 

"Im Falle eines Angriffs durch Hacker oder Datendiebstahl, diejenigen verantwortlich gemacht werden kann. Aber vor allem ist es ein wichtiger Kostenfaktor. Informieren die betroffenen durch einen Cyber-Angriff sehr kostspielig sein kann", sagte Lienau.

 

Und es kann auch ernsthaft beschädigen, Ruf des Unternehmens.

 

Des deutschen Allianz ins Leben gerufen, eine Versicherung gegen alle Arten von online-Risiken für Unternehmen im Juli. Und HDI-Gerling, eine Tochtergesellschaft des Talanx-Konzerns, folgten, bietet maßgeschneiderte Produkte für die Industrie seit September.

 

Französische Riesen Axa wird voraussichtlich Anfang Oktober den Markt eintreten, während Zürich-Versicherung eine solche Politik für KMU seit einem Jahr angeboten hat.

 

Neuer Rechtsvorschriften kommen in Europa, Gesellschaften Berichten Cyber-Angriffe und strengere Datenschutzbestimmungen einhalten, in Kraft. Und das wird Nachfrage nach Cyber Versicherungen, Experten sagen stärken.

 

Und es ist nicht nur Unternehmen, die bei riskieren, aber der Öffentlichkeit auch als Nutzung von sozialen Medien, Smartphones und online-Transaktionen steigt exponentiell.

 

Im Jahr 2011 startete Versicherer Swiss Life eine e-Reputation-Versicherung zum Schutz der einzelnen online-Reputation.

 

Französische Konzern Axa bietet eine "complete Schutz der Familie"-Paket, um alle digitalen Risiken abzudecken.

 

Dennoch ist"der Markt noch nicht reif. Viele Kunden schätzen nicht ausreichend die Schwierigkeiten, die sie im Internet auftreten können. Es gibt noch viel zu tun, zu erziehen", sagte ein Sprecher von Swiss Life.

 

Laut Software-Hersteller Norton waren rund 556 Millionen Menschen Opfer von Internetkriminalität im Jahr 2012 mit den Verlusten auf 80 Milliarden Euro geschätzt.

Ähnliche Inhalte:

https://www.airbnb.de/rooms/1087637

https://twitter.com/Abney_and_Assoc

more...
No comment yet.
Scooped by Terry Spenser
Scoop.it!

Abney Associates Tech Blog, Online fraud – why Heartbleed isn’t the only cyber threat

Abney Associates Tech Blog, Online fraud – why Heartbleed isn’t the only cyber threat | Abney and Associates | Scoop.it
It isn’t so much what’s being done, as how it’s being done
Terry Spenser's insight:

 More than a decade ago, I attended an excellent talk by well-known cryptographer and security expert Bruce Schneier, where his key point was that there was nothing new under the sun when it came to security issues.

 

Yes, the scary stuff happening on the internet at the time, involving hackers and algorithm-cracking and malware, might seem particularly alarming because it was, or seemed, as if it had never been seen before. But actually, he argued, it was all the same old crimes, just done with new tools. Theft, identity-stealing, fraud – they’d all be familiar to a Roman.

 

Every time I attend a security event, or, as last week, the launch of a security report, his point comes to mind, as it puts the latest trends in malware, or the most recent outrageous hacker exploit, in a useful context. It isn’t so much what’s being done, as how it’s being done. And that, as I discovered way back when I stumbled into my first security conference in Silicon Valley and was hooked like a phishing victim, is endlessly inventive and fascinating.

 

 

click here:
http://abneyandassocia.livejournal.com/
https://twitter.com/Abney_and_Assoc

more...
No comment yet.
Scooped by Terry Spenser
Scoop.it!

Microsoft Predicts Top Cyber Threats for 2014 | Top Tech News

Microsoft Predicts Top Cyber Threats for 2014 | Top Tech News | Abney and Associates | Scoop.it
With a little help from its employees, Microsoft is giving the security world a sneak peak of potentially the biggest threats in 2014. But it could just as easily be the 2013 list, or even the list for 2015.
Terry Spenser's insight:

There's very little to argue with here, but other than the World Cup, Microsoft's top security predictions for 2014 could easily be a list for 2013 or even 2015. Usually lists like Microsoft's 2014 top security predictions make me painfully aware of how little progress the security industry makes as time rolls on, said security expert Ken Pickering.

 

In a blog post entitled, “Top Cyber Threat Prediction for 2014,” Redmond’s Tim Rains, a director of Trustworthy Computing, offered a glimpse into the future as his company sees it -- with a little help from his companions.

 

Before we get into the list, we asked Ken Pickering, director of engineering, CORE Security, for his review of Microsoft’s predictions. He told us there’s very little to argue with here, but other than the World Cup, this could easily be a list for 2013 or even 2015.

“It’s like tracking the delta of the OWASP Top Ten over the years. How often does something have to surface as an issue before the industry takes it seriously and actually fixes the problem?” he asked. “Usually these sorts of lists make me painfully aware of how little progress the security industry makes as time rolls on.”

 

Cyber security Regulatory Efforts Will Spark Greater Need for Harmonization


Paul Nicholas, a senior director of Global Security Strategy for Microsoft’s Trustworthy Computing, predicts the U.S. government will release its Cyber security Framework and this will begin a more detailed conversation between what can be accomplished by leveraging voluntary efforts, standards and tailored regulatory actions.


“Similarly, the directive on Network and Information Security (NIS) discussions in the European Union (E.U.) will continue to evolve and examine how to improve security, including raising more detailed discussions of incident reporting. The U.S. and E.U. efforts will not happen in isolation,” he said. “It will be important to ensure that we do

not end up with hundreds of different approaches to cyber security.

 

This type of approach would begin to erode the base of the global ICT industry. In 2014, I predict that policy makers, private sector companies and vendors of all sizes will begin to see the imperative for harmonization and begin to align risk-based approaches to managing cyber security.”

 

Service-Impacting Interruptions for Online Services Will Persist


David Bills, a chief reliability strategist at Microsoft’s Trustworthy Computing, said online services across the industry and around the world have experienced service disruptions during the past year.

“I expect this trend to continue. Cloud service providers adopting contemporary resilience-enhancing engineering practices like failure mode and effects analysis and programmatic fault injection can help to reduce this trend,” he said. “The adoption of practices such as these will help to effectively address the persistent reliability-related device failures, imperfections in software being triggered by environmental change and mistakes made by human beings while administering those services.”

 

Did You Know…?


 Microsoft is giving the security world a sneak peak of what it thinks will be the biggest threats in 2014.

more...
No comment yet.
Scooped by Terry Spenser
Scoop.it!

Abney and Associates internet traffic warning black budget

Abney and Associates internet traffic warning black budget | Abney and Associates | Scoop.it

US spying successes, failures, objectives detailed in top secret 'black budget'

 

WASHINGTON — U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government's top secret budget.

 

The $52.6 billion "black budget" for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses those funds or how it performs against the goals set by the president and Congress.

 

The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees.

 

The summary describes cutting-edge technologies, agent recruiting and ongoing operations. The Washington Post is withholding some information after consultation with U.S. officials who expressed concerns about the risk to intelligence sources and methods. Sensitive details are so pervasive in the documents that The Post is publishing only summary tables and charts online.

 

"The United States has made a considerable investment in the Intelligence Community since the terror attacks of 9/11, a time which includes wars in Iraq and Afghanistan, the Arab Spring, the proliferation of weapons of mass destruction technology, and asymmetric threats in such areas as cyber-warfare," Director of National Intelligence James Clapper said in response to inquiries from The Post.

 

"Our budgets are classified as they could provide insight for foreign intelligence services to discern our top national priorities, capabilities and sources and methods that allow us to obtain information to counter threats," he said.

 

Read full article here…

 

more...
No comment yet.