Upcoming FIRST Championship Lets STEM-Gifted Youngsters Showcase Automation Inventiveness

Research Triangle Park, NC – More than 17,000 young people (ages 6-18) from around the world will gather in St. Louis, Missouri next week to enter robots they've built in fun-filled, exciting competitions that celebrate excellence in science, technology, engineering and mathematics (STEM), innovative thinking, and teamwork. The FIRST (For Inspiration and Recognition of Science…

Are Your Vendors Villainous or Adding Value?

Vendor relationships are critical to an organization's supply chain both upstream and downstream, but how can an astute executive management team understand how their partners are equipped to protect their proprietary economic knowledge? A fundamental tenet of the new supply chain is that information is as highly valued as raw materials or finished goods across…

Internet of Things Security Reaches Tipping Point

It all began more than four years ago with HD Moore's groundbreaking research in embedded device security — VoIP, DSL, SCADA, printers, videoconferencing, and switching equipment — found exposed on the public Internet and sporting diagnostics backdoors put in place by developers. The holes could allow an attacker access to read and write memory and…

Supply Chain Security: 5 Important Steps

One of the largest known breaches, resulting in 110 million records lost and hundreds of millions of dollars in damages, started with a small, third-party supplier. We're talking about Target, where attackers compromised Fazio Mechanical Services, a provider of heating, ventilation, and air conditioning services, to gain access to the retail giant's network. The breach…

Can We Trust the Future? Part 2

Machine-level trust In Part 1 of this two-part series (Can We Trust the Future?), we discussed the definition and brief history of trust and how it enabled societal evolution. We then postulated the “Rise of the Machines,” whereby our future societal evolution will heavily rely upon devices that will inevitably need to trust each other,…

Cyberwar: We Are All on the Front Line

On October 16, I attended the Cyber Security Finance Forum in Washington, D.C., and received quite a wakeup call. Speakers such as Jay Cohen, US Navy Rear Admiral (retired) and former DHS under Secretary for Science & Technology, gave insights into the problems we are faced with. Admiral Cohen reminded us that “we are at…

HP Targets Cyberthreats

The PC business at {complink 2376|Hewlett-Packard Co.} might not know where it's headed, but the enterprise business does. HP wants to provide an end-to-end security framework built around filling the gaps between existing security solutions. HP Enterprise Security Solutions rolled out more than a dozen products and services Monday targeting threats and potential liabilities resulting…

Next-Gen IP Protection: A Jobs Plan

President Obama is slated to release a plan this week to stimulate the country’s job growth. It’s difficult to speculate just how successful this program will be, but I have my own suggestion for job creation in the high-tech sector: Get serious, and I mean really serious, about combating intellectual property theft. What does IP…