Simon Hartley
Golidlocks problem of mobile device security in organizations
· Cybersecurity

Golidlocks problem of mobile device security in organizations

Usability vs. Security The “Goldilocks and the three bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for organizations. The theme is trade-offs between usability of the device and security for confidential organizational […]

Read more →
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
· Cybersecurity

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking

12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System […]

Read more →
The Common Vulnerability That Fintech and Bananas Share
· Cybersecurity

The Common Vulnerability That Fintech and Bananas Share

Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others. There has been spectacular scaling in the sector of late, and today there are no less than 27 billion-dollar valued Fintech companies. Unfortunately, […]

Read more →
The state of auto cybersecurity: current vulnerabilities in connected vehicles
· Cybersecurity

The state of auto cybersecurity: current vulnerabilities in connected vehicles

As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million lines of software code and 100 electronic control unit (ECUs), both of which provide hackers with a vast attack surface. And those two numbers are […]

Read more →