Operational technology security and the IoT
One aspect not discussed in our recent post on security issues and the Internet of Things (IoT) is the increasing trend of connecting operational technology systems to the internet.
One aspect not discussed in our recent post on security issues and the Internet of Things (IoT) is the increasing trend of connecting operational technology systems to the internet.
You might remember the LinkedIn hack of 2012. Their password encryption was extremely poor, and it was easy for anyone who obtained the leaked password files to retrieve the original passwords.
Many companies store confidential documents in the cloud, often unknown to companies themselves. Individuals simply use cloud-based services for collaboration because they are convenient.
The San Bernardino court case may be over, but the encryption debate is still very much alive.
A draft of the US senate encryption bill has been leaked, and it makes for unpleasant reading. It's called the Compliance with Court Orders Act of 2016.
WhatsApp was acquired by Facebook a couple of years ago, and they have just announced that their messenger application is now fully encrypted, end-to-end.
The UK's now infamous "snoopers' charter" (officially the Investigatory Powers Bill) was debated in parliament recently and has proceeded to the committee stage.
It's obvious that the IoT offers us a great deal when it comes to efficient management of our devices, for consumers, government and business. But there are significant reasons for concern, too.
Today Apple and the FBI were to face each other in court over Apple's refusal to provide a build of iOS to unlock a domestic terrorist's iPhone.
On 1 March, the UK's Investigatory Powers Bill (or snooper's charter) was introduced to the House of Commons. It will go through the normal parliamentary processes for a bill.