Home  |  Sarah  |  Services  |  Blog  Contact

Wednesday, 25 Mar , 2015

Weekly Wee One #5 – The IoT is like…

Share this article

The IoT - The terrifying creature from cyberspace. How much of the problem is FUD and how much is poor and rapid development of solutions...a balance to be struck in the interests of clarity

This week’s #Analogette (or, in this case, anti-Analogette)

The Internet of Things is probably the epicentre of FUD right now: Partly because worry is justified (there’s hand over fist consumer demand driven development of connected devices. Often designed without much (any?) security diligence and using old and/or binary software) and partly because that fear opens the door to rafts of security sales and consultancy opportunities.
With this tweet-size offering I’ve turned things arse about face. Taking the IoT and stripping to the very basic fact underlying a rash of recent scare-mongering analogies. The articles referenced here are not the most recent ones, but they are (in my opinion) two of the the most robust, thorough and rational ones to put this challenge in it’s proper context.
You may or may not agree…let’s see…
[tweet https://twitter.com/S_Clarke22/status/580866278530908160 hide_thread=true width=’900′] [tweet https://twitter.com/S_Clarke22/status/580864885392859137 hide_thread=true width=’900′] [tweet https://twitter.com/S_Clarke22/status/580865071741607936 hide_thread=true width=’900′]
This is the latest WWO yet, so apologies to anyone who might have been looking out for it. The result of a 6am start, 8hrs travelling and 9pm arrival home. So better late than never…hopefully 🙂
I’ll leave you with another, slightly updated version of that fab 50s film poster…
IoT Terror-3


If you liked this, you can find more here, or try The Analogies Project for loads of bigger ones from just about every big name in the security game (plus plenty of folk from other trades). It’s a fab resource.

Opinion: Paying to play with our personal data – is it ok?

We’ve migrated from ‘Hot or Not?’ to being held virtually hostage by many of the digital platforms we rely on today. In the midst of that a new processing paradigm has emerged. Myriad startups want to pay to play with your personal data. Can this tackle on-going...

In AI we will blindly trust…

...and the architects, designers, data scientists, and developers will think we are nuts I've been driven back to the blog to talk about one very specific aspect of privacy, data protection and Artificial Intelligence (exchange for Machine Learning or Algorithms as...

Data Protection, Security, and the GDPR: Myths and misconceptions #2

Welcome back! This is a shamefully delayed sequel to my first instalment of security themed GDPR thoughts: Data Protection, Security, and the GDPR: A fraught and fuzzy relationship. Here I look back again over my pre-privacy IT and InfoSec career to spot things likely...

Where and to whom does the GDPR apply?

Yeah, I doubted my sanity going at this one too, but here I am, because working out whether or not the GDPR would apply in different practical and geographical circumstances is proving harder than it really should...for everyone. This regulation has been my almost...

GDPR – You’ve analysed the gaps, but can you close them?

  There is a critical gap for most firms: An inability to interpret and leverage gap analysis, data discovery, and mapping output to actually implement technical data processing change. This article is about the challenges most large firms are facing when trying...

GDPR – The Compliance Conundrum

There is one question related to the General Data Protection Regulation that will arguably cause more ulcers than any other: How much is enough? In some portions of the GDPR 'good' is straightforward. In many others we are asked to respect principles of fairness and...

Opinion: The role of automated data discovery in a GDPR programme

Do you have any online profiles or posts featuring those 4 magic characters: G D P R? If so, whether you are a business decision maker, IT body, security body, charity boss, employed data protection pro, or job seeking data protection pro (less and less likely), you...

When Business Culture Eats Cybersecurity For Breakfast – Part One

A four-part story of budget cuts, blamestorming, breaches and massive bumps in the road to mature security. Wild Speculation & IT Transformation Do you remember Nick Leeson? On February 23rd 1995 he sent a fax telling bosses at Barings Bank he was ill and wanted...

Cyber Insurers Dictating Cybersecurity Standards?

A run down of the key challenges with choosing and using cyber insurance called out in the last few months. It looks entirely possible you will have 'adequate' security dictated by your insurers, so it is your job to understand the risk based yardstick they're using...

There Is No Such Thing As Information Security Risk

Having worked in IT and Information Security for 13 years, I've come to the conclusion that there is no such thing as information security risk. There are just business risks that have one or more security or IT related causes. There is a fundamental and persistent...