Matt Hamblen

Author Archives: Matt Hamblen

DHS should have a cybersecurity unit, says panel chairman

WASHINGTON -- The chairman of the U.S. House Committee on Homeland Security said Wednesday his top priority in 2017 will be to push for creation of a cybersecurity agency within the Department of Homeland Security. “DHS needs focus and resources, and they are doing a decent job, but could be doing a lot better with the help of Congress,” said U.S. Rep. Michael McCaul (R-Texas) in comments to reporters at the National Press Club. “It’s not a Republican or Democratic issue.” Ed Schipul U.S. Rep. Michael McCaul (R-Texas)To read this article in full or to leave a comment, please click here

Former DHS head urges Trump to see economic dangers from cyberattacks

Last week's U.S. intelligence report tracing Russia's cyber-meddling with the 2016 presidential election is a timely reminder of the cybersecurity risks that the government and private companies face, said Tom Ridge, the nation's first secretary of Homeland Security."President-elect Trump is entering into a world fraught with hazards as never before," Ridge said in a telephone interview on Monday. "Russia is a reminder that cyberattacks are a permanent risk to individuals and countries and companies, and you must do all you can to understand the risk. It's a reminder of how serious and permanent the risk is. The risk continues to get deeper."To read this article in full or to leave a comment, please click here

Former DHS head urges Trump to see economic dangers from cyberattacks

Last week's U.S. intelligence report tracing Russia's cyber-meddling with the 2016 presidential election is a timely reminder of the cybersecurity risks that the government and private companies face, said Tom Ridge, the nation's first secretary of Homeland Security."President-elect Trump is entering into a world fraught with hazards as never before," Ridge said in a telephone interview on Monday. "Russia is a reminder that cyberattacks are a permanent risk to individuals and countries and companies, and you must do all you can to understand the risk. It's a reminder of how serious and permanent the risk is. The risk continues to get deeper."To read this article in full or to leave a comment, please click here

New York gets smarter, one tech trial at a time

Smart city technology beta projects and pilot programs are gaining ground in New York City. Walk around the Big Apple, as Computerworld did recently, and you encounter everything from free public Wi-Fi to smart park benches and even sophisticated listening devices that can detect gunshots to allow a quick police response.Much of this wide-ranging tech focus goes back to 2014 when Mayor Bill de Blasio appointed the city's first Chief Technology Officer. He picked private sector tech veteran Minerva Tantoco for the role. During her tenure, she made a practice of pushing for small tech trials that could be modified and adjusted before being expanded.To read this article in full or to leave a comment, please click here

Smart city tech growing in the U.S.

The adoption of smart city technology to manage traffic, water supplies, air pollution and other needs will see an upswing this year in U.S. cities, according to AT&T's smart city executive and a market research analyst.IBM and Cisco have been pitching the themes of a smarter planet and the internet of everything for more than five years. Now, city governments nationwide are pushing pilot projects of these efforts and seeking ways to raise revenues for tech deployments by issuing bonds and imposing sales taxes to pay for them."2016 was when a lot of cities and their leadership got active around wanting to become smarter, but 2017 is the year we'll see cities move from the project phase to building out a holistic framework for smart technology," said Mike Zeto, general manager of the AT&T Smart Cities business unit, in an interview.To read this article in full or to leave a comment, please click here

Corporate boards aren’t prepared for cyberattacks

Major cyberattacks against organizations of all sizes seem to happen almost weekly. On Dec. 14, Yahoo announced the largest-ever data breach, involving more than 1 billion customer accounts.Despite the scale and potential harm from such attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks. It's not just a problem of finding the right cyber-defense tools and services, but also one of management awareness and security acumen at the highest level, namely corporate boards.To read this article in full or to leave a comment, please click here

Corporate boards aren’t prepared for cyberattacks

Major cyberattacks against organizations of all sizes seem to happen almost weekly. On Dec. 14, Yahoo announced the largest-ever data breach, involving more than 1 billion customer accounts.Despite the scale and potential harm from such attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks. It's not just a problem of finding the right cyber-defense tools and services, but also one of management awareness and security acumen at the highest level, namely corporate boards.To read this article in full or to leave a comment, please click here

Singapore’s ‘city brain’ project is groundbreaking — but what about privacy?

You've read about cities installing smart parking meters and noise- and air-quality sensors, but are you ready to embrace the idea of a city brain?The residents of Singapore are on track to do just that.Creating a centralized dashboard view of sensors deployed across a distributed network is nothing new, but it takes on a bigger -- perhaps ominous -- meaning when deployed across a major city.To read this article in full or to leave a comment, please click here

Singapore’s ‘city brain’ project is groundbreaking — but what about privacy?

You've read about cities installing smart parking meters and noise- and air-quality sensors, but are you ready to embrace the idea of a city brain?The residents of Singapore are on track to do just that.Creating a centralized dashboard view of sensors deployed across a distributed network is nothing new, but it takes on a bigger -- perhaps ominous -- meaning when deployed across a major city.To read this article in full or to leave a comment, please click here

Behavior analytics tools for cybersecurity move into enterprises

Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers, according to security analysts.Behavior analytics in cybersecurity is roughly defined as using software tools to detect patterns of data transmissions in a network that are out of the norm. The theory is that the analytics tool would detect the anomaly and alert IT managers, who would stop the unusual behavior or cyberattack.Enterprises use behavior analytics to detect intrusions that evade preventive technologies such as firewalls, intrusion-prevention systems and antivirus software. Those conventional tools match fingerprints or signatures identified in prior attacks, while behavior analytics tools study and report anomalies that are judged against a baseline of normal behavior. Among the users of behavior analytics is the National Security Agency, which uses the analytics to detect threats to its private cloud system.To read this article in full or to leave a comment, please click here

Behavior analytics tools for cybersecurity move into enterprises

Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers, according to security analysts.Behavior analytics in cybersecurity is roughly defined as using software tools to detect patterns of data transmissions in a network that are out of the norm. The theory is that the analytics tool would detect the anomaly and alert IT managers, who would stop the unusual behavior or cyberattack.Enterprises use behavior analytics to detect intrusions that evade preventive technologies such as firewalls, intrusion-prevention systems and antivirus software. Those conventional tools match fingerprints or signatures identified in prior attacks, while behavior analytics tools study and report anomalies that are judged against a baseline of normal behavior. Among the users of behavior analytics is the National Security Agency, which uses the analytics to detect threats to its private cloud system.To read this article in full or to leave a comment, please click here

HPE rolls out products to enable IoT adoption

Hewlett Packard Enterprise on Wednesday announced several software and hardware products to more securely manage the exploding universe of Internet of Things devices.October's Mirai botnet attack on unsecured IoT devices, which halted widespread access to dozens of popular internet sites, dramatizes the value of more comprehensive management and control of IoT, HPE executives said in interviews.Some of HPE's new products are intended for use by virtual cellular network providers, while others are for small and medium-sized enterprises to use in managing their local area network (LAN) operations.To read this article in full or to leave a comment, please click here

HPE rolls out products to enable IoT adoption

Hewlett Packard Enterprise on Wednesday announced several software and hardware products to more securely manage the exploding universe of Internet of Things devices.October's Mirai botnet attack on unsecured IoT devices, which halted widespread access to dozens of popular internet sites, dramatizes the value of more comprehensive management and control of IoT, HPE executives said in interviews.Some of HPE's new products are intended for use by virtual cellular network providers, while others are for small and medium-sized enterprises to use in managing their local area network (LAN) operations.To read this article in full or to leave a comment, please click here

Beware of fake apps and bad Wi-Fi hotspots while shopping by mobile phone

Black Friday and Cyber Monday holiday shoppers using smartphones should beware of fake commerce apps and fake Wi-Fi hot spots inside malls, two security firms have warned.Hackers use these fakes to grab account numbers and sensitive personal information."Cyber criminals are increasing our risk of using mobile devices while shopping, whether it is Black Friday or Cyber Monday," warned Brian Duckering, mobility strategist for Skycure, an enterprise security firm, in a blog. "Going to physical stores and connecting to risky Wi-Fi networks, or shopping online both pose increasing risks we should all be aware of."To read this article in full or to leave a comment, please click here

Beware of fake apps and bad Wi-Fi hotspots while shopping by mobile phone

Black Friday and Cyber Monday holiday shoppers using smartphones should beware of fake commerce apps and fake Wi-Fi hot spots inside malls, two security firms have warned.Hackers use these fakes to grab account numbers and sensitive personal information."Cyber criminals are increasing our risk of using mobile devices while shopping, whether it is Black Friday or Cyber Monday," warned Brian Duckering, mobility strategist for Skycure, an enterprise security firm, in a blog. "Going to physical stores and connecting to risky Wi-Fi networks, or shopping online both pose increasing risks we should all be aware of."To read this article in full or to leave a comment, please click here

Chinese smartphone vendors show sales gains as Apple, Samsung sales decline in Q3

Third-quarter smartphone sales showed strength by Chinese vendors but declines of 6% for Apple iPhones and 14% for Samsung smartphones over last year.Samsung’s decline is unsurprising, given the furor over the overheated batteries in its Galaxy Note7s that surfaced in late August, leading to a global recall of millions of the devices.“The decision to withdraw the Galaxy Note7 was correct, but the damage to Samsung’s brand will make it harder for the company to increase smartphone sales in the short term,” said Anshul Gupta, research director for Gartner, which released the smartphone third-quarter sales numbers on Thursday.To read this article in full or to leave a comment, please click here

Cisco names 10 cities using its cloud-based smart service

Cisco, which has promoted its smart city technologies for more than two years, today announced that 10 cities, including Paris and Copenhagen, are using its cloud-based service to connect to traffic, parking and environmental sensors in real time.Insights from the data collected from the Internet of Things sensors can help city agencies make operations more efficient, reduce costs and respond quicker to emergencies, Cisco said.Cisco is showcasing the technology at the Smart City Expo World Congress 2016 in Barcelona this week. The networking giant calls its service the Cisco Smart+Connected Digital Platform.To read this article in full or to leave a comment, please click here

Los Angeles: Warm weather, movie stars — and 100 million monthly cyber attacks

Los Angeles is famous for its warm weather and movie stars. But what may not be as well known is that it's also one of the largest targets for cyber attacks in the world.The city's infrastructure in highways, water and power -- and all the data behind it -- supports 4 million residents in the nation's second largest city. The city also collects data about Los Angeles International Airport as well as about the largest shipping port in the western hemisphere, where 43% of imported goods enter the U.S. The city government is even responsible for data related to elections, including yesterday's national election.It's not difficult to see the enormity of the city's security challenge, which includes protecting the personal data of city workers and residents.To read this article in full or to leave a comment, please click here

Los Angeles: Warm weather, movie stars — and 100 million monthly cyber attacks

Los Angeles is famous for its warm weather and movie stars. But what may not be as well known is that it's also one of the largest targets for cyber attacks in the world.The city's infrastructure in highways, water and power -- and all the data behind it -- supports 4 million residents in the nation's second largest city. The city also collects data about Los Angeles International Airport as well as about the largest shipping port in the western hemisphere, where 43% of imported goods enter the U.S. The city government is even responsible for data related to elections, including yesterday's national election.It's not difficult to see the enormity of the city's security challenge, which includes protecting the personal data of city workers and residents.To read this article in full or to leave a comment, please click here

What about the personal data on those millions of recalled Note7s?

The users of millions of faulty Samsung Galaxy Note7s, already turned in, face a bigger potential dilemma than whether the devices might blow up: The fate of their personal data on the devices.Many of the users of some 3 million Note7 devices sold were told by Samsung and government officials to immediately stop using the devices. They most likely didn't have time to thoroughly wipe sensitive personal data like credit card numbers or medical information.Samsung hasn't divulged what it plans to do with the Note7s that were turned in, and didn't respond this week to a query about how it plans to ensure customer data is kept confidential.The company said earlier this week that it is reviewing options for environmentally disposing of the Note7 phones after Greenpeace demanded Samsung find ways to reuse rare materials in the phones, such as gold and tungsten.To read this article in full or to leave a comment, please click here

1 3 4 5 6 7 11