Technologies

now browsing by tag

 
 

#city | #ransomware | How governments can streamline the adoption of smart city technologies — GCN

Source: National Cyber Security – Produced By Gregory Evans

INDUSTRY INSIGHT

How governments can streamline the adoption of smart city technologies

Spending on smart cities worldwide will reach over $34 billion in 2020 as cities adopt more connected technologies. From smart traffic lights that monitor traffic flow to smart grids that can make energy usage more efficient, such technologies can certainly improve the quality of life for citizens. Yet a staggering one-third of internet-of-things projects fail at the proof-of-concept (PoC) stage due to cost, security and scalability challenges. Cities must change and improve their approach to finding, testing and deploying smart technology innovations to effectively roll out such systems.

Here are three ways a dedicated PoC platform can help streamline, secure and scale the evaluation of new technologies.

1. It enables easier IoT integration and interoperability

When implementing smart city technologies, governments must consider how different technologies such as cameras and sensors will operate together in an interconnected ecosystem. The interoperability of systems is one of the most important components of a smart city. In a traditional PoC, each new technology would have to be tested individually against the existing system, but a PoC platform can automate much of the process and test all the technologies simultaneously.

A PoC platform can use artificial intelligence to replicate a virtual environment in the cloud. From there, the platform can simulate the same network behavior, including fluctuations in activity, latency and bandwidth from the original environment, to create the best possible testing ground for PoC evaluation. This PoC process allows CIOs and technology leaders to assess the interoperability and performance of the smart technology alongside the city’s existing ecosystem.

A centralized PoC platform running multiple evaluation processes can automatically compile results and data into a comprehensive KPI report, saving more time and effort. This makes it simple for governments to compare results to business and technical requirements, determine whether further testing is required and easily identify which solution can seamlessly integrate with existing systems.

2. It mitigates the risk of using sensitive data

The biggest risk of the traditional PoC process is the use of sensitive data. The sheer volume IoT devices, which will increase to almost 20 billion by 2020, means any cyberattack or data leak could have devastating consequences for a city and its citizens, as evidenced this year by the spate of ransomware attacks across the country. The lack of established standards and policies makes it even more risky for cities working with new vendors and products on interoperability. Granting a vendor access to private data and a city’s IT environment is a major security risk, but is necessary for PoC platforms to simulate an environment. Fortunately, there are tools that can safeguard information and secure the evaluation process from any malicious vendors.

By anonymizing or mimicking a small sample of data, a PoC platform can generate millions of records similar to the ones provided, giving the PoC environment a realistic set of data and without compromising security or privacy. This can effectively mitigate the dangers of data breaches since the generated information will be worthless while the sensitive data is anonymized and cannot be used.

3. It enables open innovation for large-scale projects

The pace of technological advancements means that cities will need to be constantly on the lookout for new innovations — whether it’s implementing visualization tools in Columbus, Ohio, or assessing 5G-powered drones in Raleigh and Cary, N.C. However, it’s important to ensure that any smart technology assessment has clear goals from the outset, as technology deployments risk failing due to the high cost of scaling, unclear ROI and the inability to justify the business case for the investment. A dedicated PoC platform can remedy these challenges by enabling governments to fast-track multitude vendor assessments at once, giving them more time to think strategically about how the solutions support broader business goals.

For example, a city’s evaluation of smart grid technology in a traditional PoC process could take a team months to complete. An additional few months would be required to ensure the technology securely integrates with its IT environment and develop a rollout strategy ahead of implementation. A PoC platform slashes evaluation time, saving precious resources and costs.

As urban environments transform into  connected systems, solving the inefficiencies of PoCs has become a necessity. Reinventing the PoC process with tools targeting the key components of integration and interoperability, security and scalability is a logical and essential step for governments to consider. With new technologies being introduced at a rapid pace, cities across the country are under intense pressure to keep up and can no longer afford to spend time on lengthy PoCs. 

About the Author



Toby Olshanetsky is CEO and co-founder of prooV.

Source link

The post #city | #ransomware | How governments can streamline the adoption of smart city technologies — GCN appeared first on National Cyber Security.

View full post on National Cyber Security

International Workshop on Security and Privacy Assurance Technologies for Emerging Networks (SPATEN)

General Cybersecurity Conference

 June 22, 2018 | Tianjin, China

Cybersecurity Conference Description

The 2018 International Workshop on Security and Privacy Assurance Technologies for Emerging Networks (SPATEN 2018) focuses on the problems of design and analysis of security, privacy, and data protection algorithms in various emerging network systems and concepts such as Internet of Things, Edge Computing, Fog Computing, Software Defined Networks, Blockchian, Cryptocurrency, etc. SPATEN 2018 will be held in conjunction with The 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2018), June 20-22, 2018, Tianjin, China.

The workshop seeks submissions from academia, industry, and government presenting novel research, as well as experimental studies, on all theoretical and practical aspects of security, privacy, and data protection algorithms in emerging network systems.

advertisement:

The post International Workshop on Security and Privacy Assurance Technologies for Emerging Networks (SPATEN) appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

International Conference Advanced Computer Information Technologies (ACIT)

General Cybersecurity Conference

 June 1 – 3, 2018 | Ceske Budejovice, Czech Republic

Cybersecurity Conference Description 

PURPOSES OF THE CONFERENCE:

1. Providing podium for scientists to present the results of their researches and scientific results in the field of advanced computer information technologies.
2. Motivation for scientific activity.
3. Exchange of progressive ideas and research results.
4. Development of creativity in scientific activity.

Read More….

advertisement:

The post International Conference Advanced Computer Information Technologies (ACIT) appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

International Conference on Cyber Security and Connected Technologies (ICCSCT) 2018

Source: National Cyber Security News

General Cybersecurity Conference

 March 8 – 10, 2018 | Hong Kong

Cybersecurity Conference Description 

ICCSCT 2018 is a main annual research conference aimed at presenting new improvements in Cyber Security. The conference will be held every year to make it an ideal platform for people to share views and experiences.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Developers are most wary of these technologies being hacked

Source: National Cyber Security – Produced By Gregory Evans

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology. Propeller Insights conducted the recent survey of U.S.-based software developers for…

The post Developers are most wary of these technologies being hacked appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Adama Technologies Corp. Provides Industry Update Regarding Recent SafeGuard Acquistion

Adama Technologies Corp. (OTC PINK: ADAC) provided a market update today regarding the strength and potential of their recent acquisition of SafeGuard. SafeGuard is a reseller of identity theft and data breach protection services for individuals, families and businesses and … View full post on National Cyber Security Ventures

CA Technologies to pay $614M for Burlington cybersecurity firm

Source: National Cyber Security – Produced By Gregory Evans

Burlington security software company Veracode will be acquired by CA Technologies for $614 million in cash, the companies announced Monday. The acquisition is expected to close in the first quarter of 2018. New York-based CA Technologies (Nasdaq: CA) generated just …

The post CA Technologies to pay $614M for Burlington cybersecurity firm appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How New Technologies Are Providing New Openings for Hackers

Source: National Cyber Security – Produced By Gregory Evans

The evolution of cloud and mobile technologies, along with the growing number of internet-connected devices, is presenting new opportunities for hackers and new cybersecurity challenges for businesses. Two cybersecurity executives—John Hering, the co-founder and executive chairman of Lookout Inc., and …

The post How New Technologies Are Providing New Openings for Hackers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Lockton and BitSight Technologies Offer Companies a Cyber Security Rating

379311

Source: National Cyber Security – Produced By Gregory Evans

Lockton Companies, the world’s largest privately held, independent insurance broker, and BitSight Technologies, the standard in Cyber Security Ratings, have teamed up to offer Lockton’s clients direct access to BitSight Security Ratings. The service is available immediately to all Lockton clients globally who are seeking to better understand and manage cyber risk. BitSight Security Ratings […]

The post Lockton and BitSight Technologies Offer Companies a Cyber Security Rating appeared first on National Cyber Security.

View full post on National Cyber Security

Send attackers on a wild goose chase with deception technologies

Source: National Cyber Security – Produced By Gregory Evans

Midsized companies with revenues from $100 million to $1 billion spent an average of $3 million on information security as of 2014 per “The Global State of Information Security Survey 2015” from PwC. “I promise you, bad guys are not spending $3 million to break into your organization,” says Allen Harper, chief hacker, Tangible Security. Still information burglars are getting through. And since 92 percent of IT and security professionals surveyed globally use signature-based antivirus software on their servers, despite AV’s inability to stop advanced threats and targeted attacks, according to Bit9’s 2013 Server Security Survey, exploits such as zero-days, which have no signatures give attackers the upper hand. To turn the tide, security experts are pressing enterprises to turn to behavior-based approaches where an illicit behavior can identify a probable exploit, whether security software has an example of its ‘fingerprint” or not. Security researchers are updating a behavior-based approach that has been around for decades. That approach is Deception. Deception identifies an attacker when they exhibit the behavior of simply falling for the Deception, such as by trying to interact with a fake web server that no one with a legitimate business purpose is using. CSO explores the purposes […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Send attackers on a wild goose chase with deception technologies appeared first on National Cyber Security.

View full post on National Cyber Security