Search Results
“All of Us:” THE model for IoT privacy and security!
pardon me in advance:this will be long, but I think the topic merits it!
One of my fav bits of strategic folk wisdom (in fact, a consistent theme in my Data Dynamite book on the open data paradigm shift) is, when you face a new problem, to think of another organization that might have one similar […]
Why IoT Engineers Need Compulsory Sensitivity Training on Privacy & Security
OK, you may say I’m over-sensitive, but a headline today from Google’s blog that others may chuckle about (“Noodle on this: Machine learning that can identify ramen by shop“) left me profoundly worried about some engineers’ tone-deaf insensitivity to growing public concern about privacy and security.
This is not going to be pleasant for many readers, […]
“The House That Spied on Me”: Finally Objective Info on IoT Privacy (or Lack Thereof)
Pardon a political analogy, Just as the recent indictment of 13 Russians in the horrific bot campaign to undermine our democracy (you may surmise my position on this! The WIRED article about it is a must read!) finally provided objective information on the plot, so too Kasmir Hill’s and Surya Matu’s excruciatingly detailed “The House […]
IoT’s Future Makes iPhone Privacy Case Even More Important
Yesterday’s NYT had the most thoughtful piece I’ve seen about the long-term implications of the FBI’s attempts to get Apple to add a “backdoor” to the iPhone that would allow the agency to examine the data on the phone of terrorist Syed Farook, who, along with his wife, killed 14 late last year.
The growth and potential […]
No Debate: Protecting Privacy and Security Is 1st Internet of Things Priority
This just in: your Internet of Things strategy will fail unless you make data privacy and security the absolute highest priority.
I didn’t always think that way.
Long-time readers know one of my favorite themes is what I call the IoT “Essential Truths,” the key priorities and attitudinal shifts that must be at the heart of all […]
Every IoT office needs this graphic on privacy and security
Long-time readers know that I frequently rant that privacy and security are Job 1 when it comes to the IoT.
No apologies: it’s because I spent many years in corporate crisis management, and I learned the hard way that public trust is hard to earn, easy to lose, and, once lost, difficult or impossible to regain.
That’s […]
FTC report provides good checklist to design in IoT security and privacy
SEC Chair Edith Ramirez has been pretty clear that the FTC plans to look closely at the IoT and takes IoT security and privacy seriously: most famously by fining IoT marketer TrendNet for non-existent security with its nanny cam.
Companies that want to avoid such actions — and avoid undermining fragile public trust in their products and the […]
IBM picks for IoT trends to watch this year emphasize privacy & security
Last month Bill Chamberlin, the principal analyst for Emerging Tech Trends and Horizon Watch Community Leader for IBM Market Development (hmmm, must have an oversized biz card..) published a list of 20 IoT trends to watch this year that I think provide a pretty good checklist for evaluating what promises to be an important period in which the IoT becomes more mainstream.
It’s […]
Resolved: That 2015 Is When Privacy & Security Become #IoT Priority!
I’m a right-brained, intuitive type (ENFP, if you’re keeping Myers-Briggs score…), and sometimes that pays off on issues involving technology & the general public, especially when the decidedly non-technical, primal issue of FEAR comes into the equation.
I used to do a lot of crisis management work with Fortune 100 companies, and usually worked with engineers, […]
Here’s where I draw the IoT privacy line! social sensing badges
Yikes!
I had the same reaction to this story by the Boston Globe‘s Scott Kirsner (“Is this a management breakthrough, or Big Brother in the workplace?” — sorry, no linkie: it only appears to be available through the subscribers’ archive) that a lot of people did to the story about the hacked, un-encrypted baby monitor: this […]