The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust

The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust

The Current State Of Cybersecurity 41% of total breaches in 2017 targeted the healthcare industry, making it the most popular target for breach attempts. Personally Identifiable Information (PII) combined with user credentials tops the percentage of breaches with 29% according to Wipro’s report. 88 records
Infosec thought leaders

Beyond VDI: How the hybrid cloud is forcing us to rethink an industry

Beyond VDI (Virtual Desktop Infrastructure) Before I start this blog, I want to get something off my chest. Here it goes: Leostream is not a VDI company, at least not in your typical sense of the acronym. Forget what you’ve been told about Leostream by
santa-wish-list

‘Tis The Season To Be Deploying Sensors

Deploying Sensors

Overhead the Christmas Drones are buzzing, delivering packages to the good girls and boys. Back at the main location people are analyzing the good and bad data collected over the year about each person. Data analytics that is creating a list, gathering all the data and then checking the data on that list (Twice). In the end to produce two lists. The good list of kids. The bad list of kids. I am pretty sure I am on the bad list, again.

Cyber Physical Systems Wishlist

It is the season of giving. So far this year I’ve gotten two colds and a wooden Jaguar. Needless to say I kept the Jaguar (it is actually quite nice) and have done my best to get rid of the colds. I decided to share my wish list for Cyber Physical Systems for the next year to help spread the Christmas cheer!

1. Other than my two front teeth I also want Cyber Physical System device security. Replaceable security modules that can be quickly replaced without requiring the organization replace the entire CPS device.

2. A bicycle and Cyber Physical System data management. Perhaps a standard for and support of on device data, cached data, data in transit and also data on that cell phone in your pocket.

3. Please don’t bring me ghosts again Santa, five years in a row is enough. Beyond no ghosts I would also like to see a Cyber Physical Systems integration standard. The growing number of CPS devices deployed make it really hard to integrate everything. Going forward the value of integration for the devices will be critical.

It’s a short list and frankly I hope to get all of them by the end of the year. The concept of replaceable security modules within CPS devices is a great opportunity. That way you won’t have to replace your CPS devices as security standards change. You just replace the security hardware.

 

CPS or the more consumer Internet of Things (IoT) represents a growing number of systems. As more and more of these devices are deployed the opportunity for a single unified management standard will be of significant value. A unified management protocol and standard would allow organizations to implement devices knowing they can quickly connect and manage them!

The next concept is that of integration is critical for CPS. Today there are 10 billion devices in the world. They offer services, data and connection in any number of ways. A standardized approach to integrating all these devices will be a great present.

Santa knows the value of CPS and supply chain management. I suspect if you asked him what his holiday list was about it would be just that. Taking the integration framework and management framework and applying that to the entire supply chain. Know where your parts are at all times. Create a JIT (Just-in-Time) supply chain that doesn’t have parts paid for and waiting for parts that are delayed or still in transit. Have a system where the parts arrive and are paid for at the same time. Reduce the time from ordering parts to selling your system by managing where parts are in the system and when they will be in your facility. I think Santa would like such a system. I might even get off the naughty list.

By Scott Andersen

Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

TOP ARCHIVES

Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors: What Do Millennials Prefer?

Robo-Advisors vs. Financial Advisors For technology-loving millennials, robo-advisors may seem appealing. With a robo-advisor, a portfolio is managed online by ...
5 Recommendations for Effective Governance, Risk and Compliance Management

5 Recommendations for Effective Governance, Risk and Compliance Management

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues ...
Quantum Computing opens new front in Cloud!

Quantum Computing opens new front in Cloud!

Quantum Computing As the amount of data in the world is rapidly increasing, so is the time required for machines to ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
Matthew Cleaver

Dispelling the Myths of Cloud Solutions for the Small Business

Dispelling the Myths of Cloud Solutions As a business leader, migrating to the cloud can be overwhelming due to the ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...