Trending Cyber-Kinetic Security & Cybersecurity Posts

    All Cyber-Kinetic Security & Cybersecurity Posts

    • 5G Security Zigbee Security

      Zigbee Security 101 (Non-5G IoT Connectivity Options)

      Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. It evolved from IEEE 802.15.4 wireless standard and supported by the ZigBee Alliance. IEEE 802.15.4 standard determines specifications for the physical and data link layer and Zigbee Alliance provides standards from network layer to application layer. While Zigbee determines the contents…

      Read More »
    • 5G Security LoRaWAN IoT Security

      LoRaWAN Security 101 (Non-5G IoT Connectivity Options)

      I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high bandwidth, network slicing and ubiquitous coverage becoming the foundational capability for mission critical industrial, agricultural, financial,…

      Read More »
    • 5G Security 5G Critical Infrastructure

      5G Critical Infrastructure – the Most Critical of All

      Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under the bed’, the US government has declared there is one at the back door. It accuses Chinese technology companies of deliberately building vulnerabilities…

      Read More »
    • 5G Security US vs China 5G

      Geopolitics of 5G and 5G-Connected Massive & Critical IoT

      Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can be licensed by burgeoning markets for revenue. A first-mover advantage is often a way to lock in relationships that can lead to long-term infrastructure commitments, integration support services, and service delivery platform development. As the adage goes, “Whoever owns the…

      Read More »
    • 5G Security 5G Security Privacy

      5G Security & Privacy Challenges

      Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security and privacy issues in our (very) near, and very different future that 5G will enable. In the 5G-enabled massive Internet of Things (mIoT) world we’re about to find ourselves in, we are expected to have 1000 devices connected for every person……

      Read More »
    • Cyber-Kinetic Security Smart City 5G Privacy

      Cyber-Kinetic Security and Privacy Threats in Smart Cities

      More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% – more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure that human needs are met in a fair and equitable way? How will we face challenges like resource strain, waste and pollution management,…

      Read More »
    • Cyber-Kinetic Security Cybersecurity IoT 5G Cyber-Kinetic Risks

      Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

      Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn’t a term one would use to describe one’s hairbrush. That is changing, of course, in an era of accelerating digital transformation. Now we have smart homes, smart cities, smart grids, smart refrigerators and, yes, even smart hairbrushes. What’s not so smart, though, is the way the…

      Read More »
    • AI Security AI Cybersecurity Battlefield

      AI: The Shifting Battlefield in the Cyber Arms Race

      Cybersecurity strategies need to change in order to address the new issues that Machine Learning (ML) and Artificial Intelligence (AI) bring into the equation. Although those issues have not yet reached crisis stage, signs are clear that they will need to be addressed – and soon – if cyberattackers are to be prevented from obtaining a decided advantage in the continuing arms race between hackers…

      Read More »