• 5G Security 5G Security Privacy

    5G Security & Privacy Challenges

    Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security and privacy issues in our (very) near, and very different future that 5G will enable. In the 5G-enabled massive Internet of Things (mIoT) world we’re about to find ourselves in, we are expected to have 1000 devices connected for every person… These devices will be the components of the ‘5G operating…

    Read More »
  • Cyber-Kinetic Security Smart City 5G Privacy

    Cyber-Kinetic Security and Privacy Threats in Smart Cities

    More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% – more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure that human needs are met in a fair and equitable way? How will we face challenges like resource strain, waste and pollution management, traffic congestion and connectivity? In response to these wicked problems,…

    Read More »
  • Society 5.0 5G World Economy Society

    How 5G Will Transform Economy and Society

    Since the dawn of the 21st Century, the ways in which people and organizations that use the Internet experience, perceive and act in the world is radically changing. We interact with physical objects and systems well beyond our sight and comprehension. Our cars, homes, factories and public transportation are controlled increasingly by computer chips and sensors. This interconnectedness already exceeds much of last century’s science fiction imaginings, but is poised to accelerate even more dramatically…

    Read More »
  • Smart Cities smart cities privacy

    Importance of Privacy for Smart Cities and IoT

    From The Jetsons to Blade Runner, to Back to the Future, to A.I. to The 5th Element, popular culture has long been fascinated by what the future would look like for ordinary people. In these films and countless others, humans of the future are shown engaging with technology that speaks to them, cooks for them, asks them how their day was and connects them with the outside world in a seamless and intuitive way. These…

    Read More »
  • Cyber-Kinetic Security Cybersecurity IoT 5G Cyber-Kinetic Risks

    Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

    Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn’t a term one would use to describe one’s hairbrush. That is changing, of course, in an era of accelerating digital transformation. Now we have smart homes, smart cities, smart grids, smart refrigerators and, yes, even smart hairbrushes. What’s not so smart, though, is the way the cybersecurity and cyber-kinetic security risks of these systems are often…

    Read More »
  • Cyber-Kinetic Security Cyber-Kinetic Security Railway

    Growing Cyber-Kinetic Threats to Railway Systems

    Cybersecuring railway systems from potential attackers must become paramount in the digitization that those systems currently undergo. Their cybersecurity is too closely interlinked with the railway safety to leave the door open to disruption. To make matters worse, they are increasingly being targeted. Railway systems have long been critical. Mass transit systems move hundreds of thousands of people throughout urban areas each work day. Freight systems move an estimated 40 tons of freight for every…

    Read More »
  • 5G Security IoT Cybersecurity Framework Government

    5G Making It More Important for Governments to Lead IoT Security

    The human brain is programmed to keep us safe and secure. Yes, we are separated from the rest of the animal kingdom by our advanced capacities of sense-making and decision-making, but at the core of our grey matter remains some primitive but powerful tech tasked with keeping us alive. If your amygdala senses danger, it makes a split second decision and triggers the fight-or-flight response, flooding your body with hormones like adrenaline that prepare you…

    Read More »
  • Cyber-Kinetic Security IEMI

    Intentional Electromagnetic Interference (IEMI) IoT Threat

    As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals, one significant potential remote attack vector is often overlooked: intentional electromagnetic interference (IEMI). Electromagnetic interference (EMI) surrounds us – natural causes, such as solar flares and lightning; and man-made sources such as radio and TV broadcasting, radars, microwaves and many others all emit electromagnetic waves that could disrupt operation of electrical…

    Read More »
  • Society 5.0 Innovation in Canada

    Innovation in Canada – What’s Not Working and What Is

    Canada’s rankings in innovation has lagged that of other peer nations for decades despite government efforts to address this issue. Considering its success in developing research programs at its universities, its mediocre rankings overall in technology development is disappointing. Those programs alone have not been enough to translate into entrepreneurial innovation. A 2017 C.D. Howe Institute study points out that, even though Canadians have been at the forefront of breakthroughs in emerging technologies, in many…

    Read More »
  • Cyber-Kinetic Security Canada Critical Infrastructure

    Canadian Critical Infrastructure Cyber Protection

    Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are rapidly being connected to the internet, affording attackers opportunities to target virtual systems that operate and monitor physical structures and physical processes through various modes of cyberattack. When people think of cyberattacks, their minds often go first to the financial sector. After all, that’s the type of attack people hear about most frequently; it’s where the money is and it’s…

    Read More »
  • Cyber-Kinetic Security IoT Bomb Stuxnet

    Stuxnet: The Father of Cyber-Kinetic Weapons

    While Stuxnet is gone, the world now knows what can be accomplished through cyber-kinetic attacks. As we approach the 10th anniversary of when Stuxnet was (likely) deployed, it is worthwhile to examine the effect it still has on our world. As the world’s first-ever cyberweapon, it opened Pandora’s box. It was the first true cyber-kinetic weapon – and it changed military history and is changing world history, as well. Its impact on the future cannot…

    Read More »
  • Cyber-Kinetic Security Cyber-Kinetic Railway

    Growing Cyber-Kinetic Vulnerabilities of Railway Systems

    In their growing efforts to increase efficiencies through digitization and automation, railways are becoming increasingly vulnerable to cyber-kinetic attacks as they move away from strictly mechanical systems and bespoke standalone systems to digital, open-platform, standardized equipment built using Commercial Off the Shelf (COTS) components. In addition, the increasing use of networked control and automation systems enable remote access of public and private networks. Finally, the large geographical spread of railway systems, involving multiple providers and…

    Read More »
  • Cyber-Kinetic Security IEMI

    IEMI – Threat of Intentional Electromagnetic Interference

    As our cities, our transportation, our energy and manufacturing – our everything – increasingly embrace Internet of Things (IoT) and Industrial Controls Systems (ICS), securing its underlying cyber-physical systems (CPS) grows ever more crucial. Yet, even among engineers and cybersecurity specialists, one potential attack trajectory is often overlooked: Intentional Electromagnetic Interference (IEMI). ICS and IoT – digital systems that run today’s modern society – rely on changes in electrical charges flowing through physical equipment. Creating…

    Read More »
  • Cyber-Kinetic Security Cyber-Kinetic

    When Hackers Threaten your Life – Cyber-Kinetic Attacks Intro

    The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in the driveway at the front of the house, a bright…

    Read More »
  • 5G & Massive IoT Business 5G Mobile IoT

    If You Thought 5G Was About Mobile Phones, You Were Wrong

    Everybody has been confused about the furore over 5G recently. The confusion, of course, being why would anybody be so concerned with 5G now compared to 4G or 3G or indeed any of the past cellular mobile communications specifications. Why wasn’t the USA attempting sanctions when Huawei was providing 4G and 3G equipment? How come it is an issue now even in the non-Trumpified European governments who don’t have a mini-trade war going on with…

    Read More »
  • Smart Cities Smart City Privacy

    Getting Street Smart – The Inherent Privacy Risks of Smart Cities

    Humans are moving to cities at an unprecedented rate. Today 55% of the world’s population lives in urban areas with that number expected to grow to 68% by 2050. The trend of urbanization is dramatic enough, but when it is layered with the ubiquitous trend towards technological integration the question that surfaces is, ‘What kind of cities will people be living in by 2050?’ How will they reflect the cyber-physical world taking shape around us,…

    Read More »
  • Cyber-Kinetic Security Maritime Cyber-Kinetic

    Defeating 21st Century Pirates: the Maritime Cyberattacks

    The maritime industry faces a not-so-distant future when ships will be completely autonomous, using navigation data that they receive to plot their own courses with only minimal input from shoreside control centers. The efficiencies this could bring are massive, but before this happens, cybersecurity issues must be addressed. Not only are many vessels configured in ways that invite cyberattacks, but security practices also need to be improved before the industry can safely navigate its future.…

    Read More »
  • 5G Security Regulation IoT 5G Cybersecurity

    Regulating the Security of the Internet of Things (IoT) in a 5G World

    In one of those strange inversions of reason, The Internet of Things (IoT) arguably began before the Internet itself. In 1980, a thirsty graduate in Carnegie Mellon University’s computer science department, David Nichols, eventually grew tired of hiking to the local Coca Cola vending machine only to find it empty or stocked entirely with warm cola. So, Nichols connected the machine to a network and wrote a program that updated his colleagues and him on…

    Read More »
  • 5G & AI AI Smart City Privacy

    The Future of Privacy in our Smart Living – Part 2

    In a world where the population is increasing and resources are finite, we need to find smarter ways of living together. Smart technologies hold the key to making this happen but we need to proceed with caution and build a layer of respectful trust and privacy in our smart places.

    Read More »
  • Cyber-Kinetic Security Tangible threat of cyber kinetic attacks

    Tangible Threat of Cyber-Kinetic Attacks

    Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being. That’s the threat of cyber-kinetic attacks. Our physical world is becoming more connected – which makes it more dependent on the…

    Read More »