In the UK, food and cookery programs have taken over prime viewing spots on television and the last series of BBC Bake Off resulted in a record audience.  The market for all things cooking including utensils, gadgets and ingredients has also exploded, so have we all become really good cooks and prepare our meals from scratch every night? Sadly the answer is NO!  only a mere 1 in 8 households actually cook using real ingredients, the rest of us are eating a record number of ready meals and indeed many people don’t know how to cook even the most basic of meals.  We spent a whopping £1.9 billion on ready meals in the last year, the highest for any European country.

Continue Reading

Your thoughts matter

As summer draws to a close, I resumed my usual heavy schedule of travel last week with a keynote at the SIGS Technology Summit in Bern, Switzerland at which Hugh Thompson also gave a keynote.

Continue Reading

Your thoughts matter

The recent Target breach is a really good example of Trusted Third Party (TTP) attacks have become commonplace with shuddering results.  Indeed the compromise on RSA a few years ago was not to attack RSA but steal information to make someone else’s security controls weak.

Continue Reading

Your thoughts matter

Several announcements in July have focused attention on security vulnerabilities and risks in the Internet of Things. Siemens announced an update to fix vulnerabilities in its SIMATIC automation system for energy management. Ponemon Institute, jointly with Unisys, announced its report on security vulnerabilities in critical infrastructure. And HP announced its research on vulnerabilities in IoT devices.

Continue Reading

Your thoughts matter

The BBC’s Digital Media Initiative (DMI) was envisioned not only to replace the old tape-driven system for sharing content, but to transform the whole production process, taking the BBC into the modern world of distributed digital working. None of the elements needed to achieve such a vision is ground breaking or novel at a technical level.  So what went wrong?

Continue Reading

Your thoughts matter
July 23 2014

At the same time that my RSA Research colleagues were uncovering the Boleto fraud in Brazil reported this week, Symantec released a Security Response describing a 2013 cyber-attack on US energy infrastructure, dubbed “Dragonfly“.  (Also researched by Kaspersky under the name “Energetic Bear”. F-Secure have been tracking one of the malware variants used, called Havex.) The attack used spear-phishing, water-holing and  Remote Access Trojans to compromise a number of important organizations in the United States, Spain, France, Italy, Germany , Turkey and Poland. These targets included energy grid operators and electricity generation firms, as well as oil and gas infrastructure and industrial control system equipment manufacturers.

Continue Reading

Your thoughts matter

TheDoctor landed in the Old Billingsgate Market, in London on Tuesday to help EMC reveal a number of product announcements. Possibly for most, the main news of the day was the announcement that the existing high end storage array VMAX would be replaced with VMAX3. This updated array also included an updated and rebranded version of the operating system called HYPERMAX OS.  

Continue Reading

Your thoughts matter

This year, for the first time, the content of EMCworld is being made available online – not just to EMCworld attendees, but to everyone. From keynotes to sessions to panoramic tours, Virtual EMC World 2014 makes a wealth of insights and information available, including about the themes of trust, security and privacy, just by clicking “Watch New Content” and typing in your email address.

 

Continue Reading

Your thoughts matter

So hands up who protects their personal data? It’s that age-old problem, very few of us consider data protection until it’s too late and we find we have lost data. So let’s consider your options:

 

Don’t do it
Do it manually
Outsource the problem

 
Continue Reading

Your thoughts matter

EMC has just announced the results of research into the attitudes of consumers around the world towards privacy, particularly in terms of the often conflicting requirements of online convenience and online privacy. The research results were formulated into the Privacy Index: a numerical ranking of countries in terms of the predominant attitudes of consumers in each country with regards to this issue. The results are interesting in terms of the profile it indicates for the various countries. But even more striking is the generally consistent attitude towards online privacy and online convenience, captured in three paradoxes that summarize the results of the study:

-          The “We want it all” paradox. Consumers say they want all the conveniences and benefits of digital technology, while at the same time wanting to retain all of their personal privacy.

 

-          The “Take no action” paradox. Although privacy risks directly impact many consumers, most take virtually no action to protect their privacy, instead placing the onus on government and businesses.

-          The “Social sharing” paradox. Users of social media sites claim they value privacy, yet freely share large quantities of personal information, despite lacking confidence in institutions that protect that information.

Continue Reading

Your thoughts matter