Security
and Architecture.
The
Internet of Things is a security nightmare reveals latest real-world
analysis: unencrypted traffic, network crossover, vulnerable OSes
No
less than 98 per cent of traffic sent by internet-of-things (IoT)
devices is unencrypted, exposing huge quantities of personal and
confidential data to potential attackers, fresh analysis has
revealed.
What’s
more, most networks mix IoT devices with more traditional IT assets
like laptops, desktops and mobile devices, exposing those networks to
malware from both ends: a vulnerable IoT device can infect PCs; and
an unpatched laptop could give an attacker access to IoT devices -
and vast quantities of saleable data.
Those
are the big conclusions from a real-world
test of 1.2 million IoT devices
across
thousands of physical locations in the United States, carried out by
Palo Alto Networks.
Not
sure about all aspects of privacy, but that face stuff is easy?
Washington
Privacy Act fails again, but state legislature passes facial
recognition regulation
For
the second year running, lawmakers in the state of Washington have
failed to pass sweeping data privacy legislation. The Washington
Privacy Act, or SB
6281 —
akin to Europe’s GPDR or California’s CCPA — would have allowed
individuals to request that companies delete their data. But today
Washington state House and Senate lawmakers did succeed in passing SB
6280, which
addresses public and private facial recognition use. The bill
requires facial recognition training and bias testing and mandates
that local and state government agencies disclose use of facial
recognition. It also creates a task force to consider
recommendations and discrimination against vulnerable communities.
That
bad?
What
you need to know about the Metropolitan Police's new facial
recognition technology
The
new technology was introduced across London locations in January
Facial
recognition technology led to its first arrest in February but
incorrectly flagged seven other innocent citizens on the same day.
… An
estimated 8,600 faces were scanned in Oxford Circus, generating eight
match alerts.
However
only one was an accurate identification, meaning the software had an
87.5 per cent failure rate.
(Related)
The opposite of open.
Homeland
Security sued over airport face recognition secrecy
The
American
Civil Liberties Union filed
the lawsuit in a New York federal court on Thursday, demanding that
the agency turn over records to understand the scope of its airport
face recognition system. The group wants to know who Homeland
Security works with — including private companies and airlines —
as well as internal policies and guidance on how the system is used.
… Although
U.S. citizens can opt-out of having their faces scanned, it’s not
always openly advertised.
Interesting:
Assessing Productivity as a Function of IT Maturity
It’s
Time to Reset the IT Talent Model
How
do you identify which talent in your technology teams create the most
value for your business?
This
question plagues IT leaders and gets at the heart of a conundrum many
organizations face today in their quest to transform digitally. All
CIOs know they have star engineers on their teams who are more
motivated, creative, and productive than their peers. But what sets
them apart from solid but middling performers? Most organizations
have no reliable way of pinpointing these crucial differences in
performance. As a result, leaders struggle to retain stars, reward
them fairly, and hire others of equal caliber.
No comments:
Post a Comment