There is a new trend apparently emerging to defend against data loss and data damage as a result of external hacking. Some organizations have been removing their sensitive data from the Internet or isolating such data on “private” networks. This trend reminds me of Willie Sutton’s answer when he was asked, “Why do you rob banks?” His answer was, “Because that’s where the money is.” If this trend is real and if it spreads further, expect the hackers to simply move from external hacking to insider hacking. If you ask a hacker, “Why do you rob computer systems?”, he or she would likely answer, “Because that’s where the data is.” I doubt hackers care whether it requires an external hack or an insider hack. As you will see later, removing or isolating sensitive data from the Internet has apparently not stopped the CIA from being either the hack-er or the hack-ee. Continue reading
The internal combustion engine (ICE) has reigned supreme for over 100 years, but prognosticators are predicting its demise over the next few decades – or NOT, depending on your data analytics. Like all technologies, sooner or later a disruptive replacement comes along and renders the status quo extinct. Will electric vehicle (EV) technology be the disruption that kills the ICE? I think so, but the future of EV transportation is not guaranteed.
Data analytics is the new buzz phrase these days. Public service agencies all over the world are looking at data in order to optimize service delivery, as well as help people manage their consumption of resources like electricity, water, and gas. However, data analytics, which is devoid of context, can be easily misleading and detrimental to the objectives of using it for public services. Continue reading
Editor’s intro: The Internet of Things (IoT) has become a hot topic because of unprecedented cybersecurity problems that have caused massive outages of key Internet services. IoT devices can help improve the lives of individuals, but lack of market incentives has led to huge cybersecurity vulnerabilities that threaten to undermine national infrastructure and public trust. Prof. Kevin Fu was invited to a U.S. House Hearing by Chairman Greg Walden of the Subcommittee of Communication and Technology and Chairman Michael Burgess of the Subcommittee on Commerce, Manufacturing, and Trade to discuss IoT vulnerabilities and what might be done about them. We are pleased to present a copy of his testimony. Continue reading