Trending Cyber-Kinetic Security & Cybersecurity Posts

    All Cyber-Kinetic Security & Cybersecurity Posts

    • 5G SecurityUS vs China 5G

      Geopolitics of 5G and 5G-Connected Massive & Critical IoT

      Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can be licensed by burgeoning markets for revenue. A first-mover advantage is often a way to lock in relationships that can lead to long-term infrastructure commitments, integration support services, and service delivery platform development. As the adage goes, “Whoever owns the…

      Read More »
    • 5G Security5G Security Privacy

      5G Security & Privacy Challenges

      Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security and privacy issues in our (very) near, and very different future that 5G will enable. In the 5G-enabled massive Internet of Things (mIoT) world we’re about to find ourselves in, we are expected to have 1000 devices connected for every person……

      Read More »
    • Cyber-Kinetic SecuritySmart City 5G Privacy

      Cyber-Kinetic Security and Privacy Threats in Smart Cities

      More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% – more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure that human needs are met in a fair and equitable way? How will we face challenges like resource strain, waste and pollution management,…

      Read More »
    • Cyber-Kinetic SecurityCybersecurity IoT 5G Cyber-Kinetic Risks

      Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

      Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn’t a term one would use to describe one’s hairbrush. That is changing, of course, in an era of accelerating digital transformation. Now we have smart homes, smart cities, smart grids, smart refrigerators and, yes, even smart hairbrushes. What’s not so smart, though, is the way the…

      Read More »
    • AI SecurityAI Cybersecurity Battlefield

      AI: The Shifting Battlefield in the Cyber Arms Race

      Cybersecurity strategies need to change in order to address the new issues that Machine Learning (ML) and Artificial Intelligence (AI) bring into the equation. Although those issues have not yet reached crisis stage, signs are clear that they will need to be addressed – and soon – if cyberattackers are to be prevented from obtaining a decided advantage in the continuing arms race between hackers…

      Read More »
    • Cyber-Kinetic SecurityCyber-Kinetic Security Railway

      Growing Cyber-Kinetic Threats to Railway Systems

      Cybersecuring railway systems from potential attackers must become paramount in the digitization that those systems currently undergo. Their cybersecurity is too closely interlinked with the railway safety to leave the door open to disruption. To make matters worse, they are increasingly being targeted. Railway systems have long been critical. Mass transit systems move hundreds of thousands of people throughout urban areas each work day. Freight…

      Read More »
    • 5G SecurityIoT Cybersecurity Framework Government

      5G Making It More Important for Governments to Lead IoT Security

      The human brain is programmed to keep us safe and secure. Yes, we are separated from the rest of the animal kingdom by our advanced capacities of sense-making and decision-making, but at the core of our grey matter remains some primitive but powerful tech tasked with keeping us alive. If your amygdala senses danger, it makes a split second decision and triggers the fight-or-flight response,…

      Read More »
    • Cyber-Kinetic SecurityIEMI

      Intentional Electromagnetic Interference (IEMI) IoT Threat

      As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals, one significant potential remote attack vector is often overlooked: intentional electromagnetic interference (IEMI). Electromagnetic interference (EMI) surrounds us – natural causes, such as solar flares and lightning; and man-made sources such as radio and TV broadcasting, radars, microwaves and many others…

      Read More »