Virtual and Augmented Reality Cyber Security Challenges

Televisions have been the pride of our living rooms for decades serving as the primary platform for entertainment and education. Now, with the advent of personal computers, mobile phones and tablets, we are spoilt for choice with options on media consumption. While each of these developments was significant, I believe they pale in comparison to the potential of virtual reality/augmented reality, or VR/AR. VR/AR will radically change how we work, learn, play, exercise, communicate, transact, socialize and consume content in the future—and with it VR/AR also comes with its unique set of cyber security challenges.

Read more

The Dark Side of “Smart”? Cars—Why NextGen Vehicles Pose Cyber Risks to the Entire Automotive Ecosystem

The automotive industry is in the midst of a technological revolution thanks to the increasing digitalization and connectivity of cars. More than 82.5 million automobiles sold worldwide will be connected to the Internet by 2022—three times more than the 26.5 million on the road this year. In just seven years, 78% of cars sold globally will be connected, compared to just 30% today.

Read more

Future Blockchain Cyber Security Challenges

Blockchain is heralded as one of the most important inventions of the 21st century because it is widely seen as the future of all economic transactions—not just for monetary transactions, but for virtually everything of value. As companies face greater data management and security challenges, blockchain may present a safer alternative than the current mechanisms that financial institutions use for peer-to-peer (P2P) transactions. More than 40 top financial institutions and a growing number of firms across industries are investing millions to experiment with blockchain-enabled distributed ledger technology.

Read more

The Future of Cyber Security: Building Resilient Targets That Defend Themselves

The sophistication of cyber attacks is expected to increase exponentially, yet defense mindsets remain rudimentary. Overwhelmingly, the security efforts adopted by most organizations focus on building strong defensive walls designed to keep malicious actors, viruses and programs out; the reality is that these defensive walls will last only until attackers find a way to jump over the wall.

Read more