The new initiative aims to takes the guesswork out readiness, articulating threats, mapping them to CSF controls and giving healthcare organizations a blueprint for better cybersecurity posture.read more
A new trends report published by the law firm Cooley report suggests that the venture market remains largely healthy for now. In the fourth quarter, for example, Cooley handled 187 “disclosable” (versus stealth) deals that represented more than $2.7 billion of invested capital. That’s 18 percent more deals than it closed in the fourth quarter of 2015 — though the amount of money involved fell 23 percent of the year-earlier period. (VCs were writing smaller checks into a greater number of startups.)read more
Passwords are far from dead – thanks to the Internet of Things, the traditional authentication mechanism will explode in the next decade.
By 2020, the exchange of data between systems will require more than 300 billion human and machine passwords to authenticate, according to a new report out today that concludes that the growth of internet of things (IoT) devices and online accounts will drive this password explosion.read more
The past year has marked a dark time in cybersecurity globally. 2016 started off with @DotGov hackers doxxing thousands of U.S. federal employees; proceeded to the Anonymous breach of the Philippine Commission on Elections exposing personal identification information on every voter in the entire country and progressed to news of massive — and previously unreported — user-information theft from LinkedIn, Yahoo, Dropbox, and Oracle.read more
Many elements make up a thriving entrepreneurial economy. Among them are cultures that reward risk and don’t penalize honest failure; workers who are diverse in terms of skills and training; clusters of innovation in cities or universities; and access to capital.
Just as high on the list is a regulatory climate that encourages the free flow of talent and that lowers barriers to entry into the startup economy.read more
As a new presidential administration takes over, it will need to pay significant attention to cybersecurity. Indeed, we’ve already been told to expect “a comprehensive plan” for cybersecurity in the first few months of the new administration. But as a professional who has long been part of the global internet security community, I am pessimistic that the typical government and individual plans or responses to our ongoing cybersecurity concerns actually will lead to meaningful improvements.read more
It never fails that the greatest innovations often come wrapped in obscurity and misunderstanding. I can imagine a scene in which the first wheel was met with head scratching, confusion, and comments along the lines of, “Yeah, but it’s going to keep rolling away on us! Square wheels are so much more predictable.”read more
The military’s most prolific leaker of digital documents has ushered in an age of even more increased surveillance over government workers. The legacy of Chelsea Manning’s actions is under discussion in the wake of the announcement that the former Army private will be released from military prison in May. In one of his last official acts, President Obama commuted her sentence for violations of the Espionage Act and copying and disseminating classified information.read more
Google says it provided tips and recommendations to over 90,000 developers on how they can fix security flaws in their applications before uploading their apps to Google Play.read more
Just catching up on some recent topics…
Following a Dec. 29 column on the pros and cons of toll roads, an attentive reader noted that tolls need not apply to all lanes on a stretch of freeway. In Colorado, for example, express lanes in parts of the Interstate Highway system help manage congestion and speed up travel for motorists. Drivers who choose to pay the toll can use express lanes in the Denver area that are otherwise reserved for buses and carpools.read more
One of the promises that virtual reality offered was that we’d all be able to watch “courtside” sports games without having to leave our couches. Sporting event organizers from the Rio Olympics to the British Premier League have touted the new technology as a way to be there without having to deal with the expense, travel and crowds of an actual game.read more
Donald Trump has now been sworn in as the 45th president of the United States of America. Along with his administration, the new president will usher in a number of drastic changes — specifically in the area of telecommunications and the world of IoT.
There is a strong possibility that the new White House administration wants to dump “Net Neutrality.” How does this impact IoT?read more
Dignity Health chief information officer Deanna Wise was once hesitant of putting health data in the cloud. Now she’s an outspoken proponent.
Whatever reservations Deanna Wise had about using the cloud for data storage, she has long gotten over them now.
The Dignity Health CIO, in fact, said she shared common concerns about the functionality, dependability and security of the cloud as virtual storage shot to prominence as a cost-friendly, labor-saving option for health IT systems. And she shared the hesitation that many felt at the time.read more
The Russians spent a year inside the Democratic National Committee before they were discovered. It took five months for OPM to catch the thieves that stole the records of more than four million federal employees. Intruders broke into Yahoo’s systems in 2013, and we don’t even know how long they were inside; Yahoo only discovered the hack when stolen data turned up for sale on the dark web.read more
With the start of a new year, it’s time to rethink your organization’s culture and not just its goals. Here are best practices for leveraging your culture to create business success.
Winnow your list of values
Across the street from my house sits a welcoming red-tile-roofed Catholic grade school campus with bright white adobe walls. The children wear navy blue uniforms, and the well-kept Catholic Church at its center has the charm only decades can bestow. School leaders recently placed banners naming the school’s values on the wire-fenced wall enclosing the playground: Sharing, Stewardship, Respect, Service, Gratitude, Empathy, Cooperation, Celebration, Building peaceread more
IBM Watson Health and the FDA announced on Wednesday that they would work together on an initiative to create a secure, efficient and scalable exchange of health data using blockchain technology.
The technology giant and the federal agency will explore the exchange of data from sources, such as EMRs, clinical trials, genomics and health information from mobile devices, wearables and the Internet of Things.
With an initial focus on oncology-related data, IBM and FDA said they intend to share initial research findings in 2017 under the two-year agreement.read more
A new partnership aims to harness insights from Internet of Things (IoT) devices to save insurance companies a passel.
At the recent Consumer Electronics Show, ROC-Connect said it is partnering with CoreLogic to assist insurers in bringing IoT devices to market.
ROC-Connect is a Silicon Valley-based firm that specializes in providing Smart Home as a Service capabilities. Headquartered in Irvine, Calif., CoreLogic provides financial, property and consumer information.read more
Saddled with $40,000 in college loans, Catherine Berendsohn, 29, struggled to get a web design business off the ground after graduating from Florida State University in 2010. Ms. Berendsohn, an artist-entrepreneur, wanted to rent a storefront and start a roving studio in Monterey, Calif. Her student loans, however, prevented her from getting the money she needed.read more
The nation’s biggest wireless carriers are making it a bit harder to keep your grandfathered unlimited data plan.
AT&T intends to raise the price of its “legacy” plan, which it no longer sells, by $5 a month in March — bringing the total monthly price of the plan to $40. This marks the second time that AT&T has upped its rate for this group in 12 months.read more
Data breaches are all over the news. Yahoo admitted that at least 500 million user accounts were affected by a 2014 cybersecurity breach. The 2016 election season was filled with revelations gleaned from stolen emails. The Justice Department, Internal Revenue Service, the US Navy, and Snapchat all suffered breaches in 2016. The list seems endless. Most significant, however, were the 2015 breaches of the Office of Personnel Management (OPM), which experienced two separate cybersecurity incidents that resulted in stolen personnel files of almost 22 million people who had undergone background investigations.read more