Posts about Cybersecurity

A blockchain is a peer-to-peer distributed ledger (information recorded in a shared database) that enables open and trusted exchanges over the internet without using central servers or an independent trusted authority. Using consensus, a shared record is distributed to all participants in a network to validate transactions and remove the need for a third-party intermediary ...
Read the full post

Your robot might beat you up. It sounds like a tired sci-fi cliché, but it’s true. Early last month, security firm IOActive released research that documented the sorry state of robotic security. The firm found lots of problems – and did so without looking very hard ...

Read the full post
In today’s evermore networked society, data protection is a serious business. Security breaches lead to unwanted headlines and a loss of trust in enterprise organizations (such as banks or healthcare providers). Data security and keeping ahead of potential attackers, is a rapidly evolving field of development. Potential areas may involve safeguarding modern cloud computing environments or protecting commercial activities over the web ...
Read the full post
NETCONF Call Home, or reverse secure socket shell (SSH), is a technique that enables network functions virtualization (NFV) and software-defined networking (SDN) devices to establish a connection to a service provider control systems and protects the virtual customer premises equipment (vCPE), usually deployed behind a cable modem or a firewall ...
Read the full post
Beginning a post on cyber security with the observation that the threat being discussed is frightening is a bit redundant. They all are frightening. Very often, today’s threats are more dangerous because they are a mix of multiple things that, when combined, are more potent than the sum of their parts. In this case, four elements are present: botnets, DDoS attacks, the internet of things (IoT) and connected consumer electronics equipment. Put together, these inexpensive ingredients are enough to threaten the internet …
Read the full post