Cyber-Kinetic Security
-
The Dual Risks of AI Autonomous Robots: Uncontrollable AI Meets Cyber-Kinetic Risks
The automotive industry has revolutionized manufacturing twice. The first time was in 1913 when Henry Ford introduced a moving assembly…
Read More » -
Digital Actions, Lethal Consequences: A Cyber-Kinetic Risk Primer
Our physical world is becoming more connected – which makes it more dependent on the cyber world. Many physical objects…
Read More » -
Saudi Arabia Vision 2030: Cybersecurity at the Core of Transformation
Last week, the Saudi Data and Artificial Intelligence Authority (SDAIA) launched a nationwide awareness campaign called “Ask Before”, intended to educate the…
Read More » -
Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap
A term first coined by the Japanese government, “Society 5.0” describes “A human-centered society that balances economic advancement with the…
Read More » -
Cybersecurity and Safety in the 5G-Enabled Smart-Everything World
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see…
Read More » -
Opportunity and Cybersecurity in the Age of 5G
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the…
Read More » -
IIoT and Trust and Convenience: A Potentially Deadly Combination
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because,…
Read More » -
5G Network: A Quantum Leap in Connectivity – and Cyber Threats
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the…
Read More » -
NFC Security 101 (Non-5G IoT Connectivity Options)
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with…
Read More » -
RFID Security 101 (Non-5G IoT Connectivity Options)
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for…
Read More » -
Wi-Fi Security 101 (Non-5G IoT Connectivity Options)
The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE…
Read More » -
Bluetooth Security 101 (Non-5G IoT Connectivity Options)
Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4…
Read More » -
Zigbee Security 101 (Non-5G IoT Connectivity Options)
Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and…
Read More » -
LoRaWAN Security 101 (Non-5G IoT Connectivity Options)
I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a…
Read More » -
Risks of AI – Meeting the Ghost in the Machine
Because it demands so much manpower, cybersecurity has already benefited from AI and automation to improve threat prevention, detection and…
Read More »