Depending on what side of the fence you are on is whether you support net neutrality. But if there is one thing for sure, the debate on this subject will go on, and on, and on, regardless of the FCC (Federal Communications Commission), www.fcc.gov, ruling last week.
Today on my radio show http://www.peggysmedleyshow.com/ 12 CT, once again I will be talking about perhaps the most common approaches behind many of the cyberattacks that are making headline news and what companies need to be doing to fend off the bad guys in the M2M/IoT (Internet of Things) marketplace.
How did you celebrate Data Privacy Day? It’s a pretty safe bet that most businesses and consumers didn’t pay close attention to January 28, which commemorates the signing of Convention 108, the first legally binding international treaty dealing with privacy and data protection, in 1981.
Each day, thousands of new devices are connected to the IoT (Internet of Things) including cars, home thermostats, smart meters, medical devices, and much more. These connected devices are transforming and improving our lives, and at the same time, opening potential access points for a variety of cyber security threats.
As a regular reader of my column you know that I have been talking about cybersecurity a lot during the past 18 months, and with reason. Sadly, corporate security breaches have reached an all-time high.
LTE continues to gain a stronger foothold in automotive, healthcare, wearables, energy, and the list goes on. As companies continue to prepare for the next big wave and the leading carriers look to sunset their legacy 2G and 3G networks for a more robust global standard, single-mode chipmakers and M2M/IoT providers are tapping into their devices.
For many consumers our biggest concern was that Big Brother may be watching. Now we have to be more concerned that Big Brother is really a Big Bad guy lurking in the deep dark Web...
It’s interesting to note that one way to find out where people, companies, organizations, and governments place their priorities is to look at how these various entities spend their money.