Cyber-Kinetic Security
-
The Dual Risks of AI Autonomous Robots: Uncontrollable AI Meets Cyber-Kinetic Risks
The automotive industry has revolutionized manufacturing twice. The first time was in 1913 when Henry Ford introduced a moving assembly line at his Highland Park plant in Michigan. The innovation changed the production process forever, dramatically increasing efficiency, reducing the…
Read More » -
Digital Actions, Lethal Consequences: A Cyber-Kinetic Risk Primer
Our physical world is becoming more connected – which makes it more dependent on the cyber world. Many physical objects around us are no longer just physical, but extend into cyberspace, being remotely monitored and controlled. Consider the power plant…
Read More » -
Fortifying the Future: Cyber-Kinetic Risks in Kingdom of Saudi Arabia’s (KSA) Technological Zeitgeist
To fortify its cyber-kinetic defenses in line with growing digital transformation and infrastructural expansions, Saudi Arabia must adopt a multi-layered approach that encompasses regulation, technology, and human capital. To this end, the Kingdom has already embarked on a comprehensive strategy…
Read More » -
Saudi Arabia Vision 2030: Cybersecurity at the Core of Transformation
Last week, the Saudi Data and Artificial Intelligence Authority (SDAIA) launched a nationwide awareness campaign called “Ask Before”, intended to educate the public about the significance of personal data ahead of the implementation of a new national personal data protection system. Emphasizing…
Read More » -
Securing Society 5.0
A term first coined by the Japanese government, “Society 5.0” describes “A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space.” The fifth evolution of the society,…
Read More » -
Cybersecurity and Safety in the 5G-Enabled Smart-Everything World
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people,…
Read More » -
Opportunity and Cybersecurity in the Age of 5G
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress. The first industrial revolution mechanized production using natural elements like water.…
Read More » -
IIoT and Trust and Convenience: A Potentially Deadly Combination
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the same technology now promising to safely cook consumers’ evening meals was the backbone of a military…
Read More » -
5G Network: A Quantum Leap in Connectivity – and Cyber Threats
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived…
Read More » -
NFC Security 101 (Non-5G IoT Connectivity Options)
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology operates in 13.56 megahertz and supports 106, 212, or 424 Kbps throughput. There are three available…
Read More » -
RFID Security 101 (Non-5G IoT Connectivity Options)
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it is commonly deployed in the latest biometric passports. It operates in several frequency bands like Low…
Read More » -
Wi-Fi Security 101 (Non-5G IoT Connectivity Options)
The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.). Within 50m range, it operates in 2.4 GHz and 5GHz frequency bands,. This technology was developed…
Read More » -
Bluetooth Security 101 (Non-5G IoT Connectivity Options)
Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4 GHz frequency band and shares this resource with many other technologies. Bluetooth is the optimal solution for establishing small wireless…
Read More » -
Zigbee Security 101 (Non-5G IoT Connectivity Options)
Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. It evolved from IEEE 802.15.4 wireless standard and supported by the ZigBee Alliance. IEEE 802.15.4 standard…
Read More » -
LoRaWAN Security 101 (Non-5G IoT Connectivity Options)
I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with…
Read More »