(Insider Story)

Read more

Mingis on Tech: Blockchain explained

Credit to Author: Ken Mingis| Date: Wed, 13 Dec 2017 10:30:00 -0800

It’s the most disruptive technology since the arrival of the Internet.

Or maybe it’s the next Linux, an open-source technology that offers great promise, but somehow never seems to make it to the mainstream world.

“It,” in this case, is blockchain – the buzz-worthy distributed ledger technology that first came into widespread use with Bitcoin represents a new paradigm for the way information is shared. FinTech firms are embracing it and a variety of companies are already rushing to figure out how they can use it to save time and admin costs, according to Computerworld Senior Reporter Lucas Mearian.

To read this article in full, please click here

Read more

How blockchain will underpin the new trust economy

Credit to Author: Lucas Mearian| Date: Thu, 07 Dec 2017 03:20:00 -0800

Over the next two years, enterprises are expected to ramp up their efforts to test blockchain technology as part of a new method of establishing trust in a digital economy.

New research from consultancy Deloitte LLP shows a “trust economy” is now developing around person-to-person (P2P) transactions enabled by blockchain technology and not dependent on more traditional methods such as credit ratings or guaranteed cashier’s checks.

“Rather, it relies on each transacting party’s reputation and digital identity – the elements of which may soon be stored and managed in a blockchain,” Deloitte analysts said in a report.

To read this article in full, please click here

Read more

The best mobile threat defense is mobile threat detection

Credit to Author: Lucas Mearian| Date: Wed, 22 Nov 2017 03:34:00 -0800

As enterprises push ahead with mobile-first strategies – and employee smartphones and tablets increasingly becoming business tools – the importance of mobile threat defense (MTD) is growing.

Using mobile threat detection and defense, however, is no small task; the technology must cover applications, networks and device-level threats to iOS and Android phones and tablets to be effective.

“We talk about mobile threat defense, rather than detection – the reason being these solutions not only detect, but also can prevent and remediate threats,” said Dionisio Zumerle, research director for mobile security at Gartner.

The MTD market is growing in terms of adoption, and has started to attract attention from endpoint protection platform (EPP) vendors and in other related markets, according to a recent report from Gartner.

To read this article in full, please click here

Read more

(Insider Story)

Read more

What Face ID means for iOS and device access

Credit to Author: Ryan Faas| Date: Fri, 29 Sep 2017 03:11:00 -0700

The most obvious difference between the upcoming iPhone X and every iOS device that preceded it is the loss of the iconic Home button. For years, it has served as the fingerprint sensor for Apple’s Touch ID technology, offering easy and secure unlocking of the device as well as authentication for transactions.

To read this article in full or to leave a comment, please click here

(Insider Story)

Read more

4 ways blockchain is the new business collaboration tool

Credit to Author: Lucas Mearian| Date: Tue, 23 May 2017 03:01:00 -0700

While blockchain may have cut its teeth on the cryptocurrency Bitcoin, the distributed electronic ledger technology is quickly making inroads across a variety of industries.

That’s mainly because of its innate security and its potential for improving systems  operations all while reducing costs and creating new revenue streams.

David Schatsky, a managing director at consultancy Deloitte LLP, believes blockchain’s diversity speaks to its versatility in addressing business needs, but “the impact that blockchain will have on businesses in various industries is not yet fully understood.”

To read this article in full or to leave a comment, please click here

Read more

Industrial robots are security weak link

Credit to Author: Sharon Gaudin| Date: Tue, 09 May 2017 03:00:00 -0700

Industrial robots used in factories and warehouses that are connected to the internet are not secure, leaving companies open to cyberattacks and costly damages.

That’s the word coming from a study conducted by global security software company Trend Micro and Polytechnic University of Milan, the largest technical university in Italy.

“The industrial robot – it’s not ready for the world it’s living in,” said Mark Nunnikhoven, vice president of cloud research at Trend Micro. “The reality is these things are being connected in more and more places. There are a lot of attacks that could happen in that environment.”

The study looked at Internet security vulnerabilities that could involve industrial robots used on manufacturing lines in areas such as the automobile and aerospace industries. The robots, which generally look like large mechanical arms, are used to move heavy objects, weld seams and fit pieces together. The machines also can be found moving and stacking crates in warehouses.

To read this article in full or to leave a comment, please click here

Read more