Menu

Blog

Archive for the ‘security’ category: Page 120

Feb 15, 2016

New HIPAA Guidance For Mobile Apps, Health Info Exchange

Posted by in categories: biotech/medical, business, health, mobile phones, robotics/AI, security

I was waiting for this HIPAA’s new guidelines for mobile apps (focuses a lot on IAM); this is only the first wave. We will see more when more AI is launched.


Federal regulators have issued new guidance, including material to clarify for healthcare entities and software developers various scenarios where HIPAA regulations might apply to mobile health applications, including situations when patients use smartphones to collect or transmit personal health data.

See Also: 2015 Breach Preparedness and Response Study: The Results

Continue reading “New HIPAA Guidance For Mobile Apps, Health Info Exchange” »

Feb 15, 2016

Where Artificial Intelligence Is Now and What’s Just Around the Corner

Posted by in categories: bioengineering, biological, cybercrime/malcode, internet, robotics/AI, security, virtual reality

I believe that AI holds a lot of promise and many great things; however, we have to correct some very critical issues 1st before compound a huge issue that we have today. And, that is Cyber Security and re-establish trust with our consumers and customers. Without these 2 being fully addressed; you will compound these two challenges with AI plus run the risk of having an IoT that most people will not wish to use due to hackers, bad data, etc. Not to mention lawsuits for Wi-Fi connected robotics that were hacked and injured or worse some innocent person.

I believe need to ensure priorities are in order before we make things worse.


Unexpected convergent consequences…this is what happens when eight different exponential technologies all explode onto the scene at once.

Continue reading “Where Artificial Intelligence Is Now and What’s Just Around the Corner” »

Feb 15, 2016

Hackers Demand $3.6 Million from Hollywood Hospital Following Cyber-Attack

Posted by in categories: biotech/medical, business, robotics/AI, security

Lack of good Cyber Security across the net, will continue to be a key reason why AI in general will not deliver the return on new AI tech products and robots / devices. $3+ million in ranson may not be that large to mid size and large tech companies; however, it is everything to small businesses and small businesses and consumers is what keeps tech in business.


Hospital staff severely impeded in their day-to-day work.

Read more

Feb 14, 2016

Bringing Innovation into Cyberdefense Technologies

Posted by in categories: cybercrime/malcode, internet, security

Nice article; something that I agree very much with is the perspective that both Cyber Security is intertwined with technology innovation and adoption. Tech and other companies creating products or even services that leverages the net, can easily see their revenue potentials impacted due to poor Cyber Security. Example, Hello (Wi-Fi) Barbie by Mattel; when it was announced that the doll was indeed hackable; many buying consumers buying for their children left her on the shelf.


Hackers use innovative thinking when breaching systems, why can’t government?

by Larry Karisny

Continue reading “Bringing Innovation into Cyberdefense Technologies” »

Feb 14, 2016

Top CEOs Focusing on Cognitive Computing

Posted by in categories: business, cybercrime/malcode, internet, neuroscience, robotics/AI, security

I believe it is wonderful to think about cognitive computing. However, as a fellow CIO & CTO, I would suggest a key priority has to be focused on Cyber Security until it is resolved; or in a better position to proactively blocker would be intruders. Without a solid Cyber Security plan and model in place and operational; your cognitive computing capabilities will be worth nothing in the end once hackers are helping themselves to your IP and other information as well as your AI machines.


The news comes from the recent IBM Institute for Business Value study, “Redefining Competition: Insights from the Global C-suite Study — The CEO perspective.” Researchers interviewed more than 5,000 C-level executives worldwide about their perspectives on a variety of technology issues, including the importance of mobile solutions, cloud Relevant Products/Services computing, and the Internet of Things.

Torchbearers and Market Followers.

Continue reading “Top CEOs Focusing on Cognitive Computing” »

Feb 14, 2016

Chinese cyber strategy-building deterrence

Posted by in categories: cybercrime/malcode, military, security, space

China’s public report on their own Cyber Security Strategy — don’t get too excited; it is a “public” version of their plan (mean nothing in depth).


New cyber warfare unit

While China was assessed to have cyber warfare capabilities for quite some time, the declaration by its Central Military Council of the formation of a new military branch focussed on digital battleground technically called Strategic Support Force on 1st Jan. 2016 confirmed this. This new force is mainly aimed at providing resources capable of protecting China’s cyber and space security. On this occasion Xi pointed out that this force is central to achieving the “Chinese Dream” suggesting its importance.

Continue reading “Chinese cyber strategy-building deterrence” »

Feb 14, 2016

Clueless In Cyber-Security Land

Posted by in categories: cybercrime/malcode, neuroscience, robotics/AI, security

Very good read; and hints at something that I have been highlighting for a while around AI, NextGen transformation and adoption, etc. One very large brick wall that I highlighted in my latest posts around 5 areas that need to be address for AI to be adopted more broadly is Cyber Security.

If we do not get Cyber Security address soon around hackers, cloud, etc. AI (including robotics), brain interfaces, etc. will be either rejected or very limited in its adoption. It is just that simple.


What are CISO’s (Chief Information Security Officers) worrying about in 2016?

Continue reading “Clueless In Cyber-Security Land” »

Feb 14, 2016

North Korea Aims For Submarine-Launched Nuclear Missiles

Posted by in categories: military, security, space

This story crosses into the realm of satellite launchers and commercial space, but has troubling implications for international security. I personally am a bit more worried about North Korea’s ability to secure ballistic sub-launched weapons of mass destruction since I think that they offer more stealth than an ICBM silo, which we can fairly easily detect.


North Korea’s potential intercontinental ballistic missile (ICBM) threat may be stealing headlines, but the rogue state’s interest in submarine-launched nuclear weapons is arguably even more worrisome.

Read more

Feb 14, 2016

History: I know that we often write about the future, etc

Posted by in categories: education, food, habitats, security, sustainability

However, one also must look at the past for insights and guidance on things that were done wrong to ensure bad history is not repeated.

Therefore, let me share with you a part of history that we need to be aware of and protect our future from ever repeating again.

Many folks have never heard of Poor Farms in the South and Poor Houses in some parts of the Midwest. Before soc. Security and Welfare we had poor farms/ houses. They date from the late 1800s until 1930s.

Poor farms/ houses were often filled with the elderly and others that had no money or anyone to take care them. People often worked the land for 16+ hours days, dressed in rags, and had very little to eat. Once you were there you could not leave ever until you died.

Continue reading “History: I know that we often write about the future, etc” »

Feb 13, 2016

IoT Could Be Used by Spies, U.S. Intelligence Chief Says

Posted by in categories: business, electronics, habitats, internet, security

More Intel Concerns


James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries.

As the Internet of things has grown, so has the debate about security around it.

Continue reading “IoT Could Be Used by Spies, U.S. Intelligence Chief Says” »