Artificial intelligence

It is time for research to think about security and privacy

We usually talk about cyber security and privacy related to the world of industry and personal, but today I would make some points related to research in universities. how much security aware are universities? This is an interesting topics, looking at the statistics on cyber security attacks I would say security and privacy awareness is not at the first point in their needs. So bad … well first of all let’s make a little distinction: engineering vs the rest it is out of doubt that engineering universities and research are more cyber security savvy than the rest. Some of them…

Dear CISO, please talk about business with your board, not technicality.

Antonio Ieranò CSO, Cyber Security Architect, technical evangelist, consultant, writer, journalist and trainer Dear CISO and Board I think we should always consider our job as a part of the business. We finally started to consider cyber security and data protection as a serious issue but now the question is how we evaluate a risk in our analysis and business plans… Current documentations and reports, for risk analysis, presented to most of the boards use just a flag (High, medium, low risk) but does not seems to specify any metric. Without metric it is hard to make sound evaluation and…

NFV network function virtualization security considerations

I have been asked to write down a few things related to NFV and security. NFV is relatively a new thing in the IT world. It has been on the news in 2012 and since then it has followed the developing path common to the virtualization technologies. Virtualization has made dramatic improvement in the last years. It all started at first with simple virtualization platforms, of course VMware on top of our mind, but not only. The idea was to abstract HW platforms from software ones. Developing the idea, the abstraction growth covering multiple hw platforms moving also to the…

Happy new insecure 2017: my resolutions and wishlist for new year

Here we are, a new year comes and we, as cyber security expert, will keep warning the world about the deeply insecure world we are living. And we will announce new technologies and new devastating scenarios related to new technologies. IoT and Cloud will rise their evil face while bad people will be lurking in the dark waiting to attack the innocent lamb crossing the road. But, in all of this, the most of the damage will be still done by bad designed systems, by managers that does not understand what means living in a digital world, by politicians that…

The IoT Files: Culture

The IoT Files: Culture   In the previous IoT flies tried to outline what are, from my point of view, some key factor that have to be taken into account when talking about IoT. The last, but not the least, point I would like to put some notes is culture. Since IoT is something that will shape out way of life on many aspect, we have to convene that culture is a key element in order to positively and safely embrace it. Culture refers to billions of things, from language structure to literature, from how we share information to how…

Posts navigation