Krish Kupathil, CEO, Mobiliya Technologies, says security cannot be stressed enough when it comes to IoT (Internet of Things).
Alex Herceg, analyst, Lux Research, says in terms of privacy some of the data and devices can listen to things we are saying and know where people are in a retail store, and we need consumers to understand what the privacy implications are.
Joe Wiesenfelder, executive editor, Cars.com, says consumers are not concerned about hackers wirelessly breaking into cars, and that surprised him that it was even possible because automobiles are not evolving as quickly and are risk averse.
Peggy addresses the recent hack of the Fraternal Order of Police, and warns that we will need to be on the lookout for cyber criminals who change or manipulate data, not just steal it.
Larry Ponemon, chairman and founder, Ponemon Institute, and member of the Visual Privacy Advisory Council, says visual hacking is where the bad guy observes surfing that is on your screen or printed material; it is anything you can gather visually and then used for nefarious purposes.
Herman Yau, cofounder and CEO, Tend, says the product is created to address some of the key problems for home security.
Aike Müller, cofounder, Keezel, says the device is a portable Internet security device and it protects you on Wi-Fi networks.
Luc Darmon, chief marketing officer, Decawave, says it has been designing an exciting technology and integrating it into a single chip.
Peggy says there are some hackers on our side, trying to do some positive things and ‘ethical hacking.’ On the automotive side, she asks, however: How can people guarantee these white-hat hackers are ethical when they have to think like the bad guys?
Matt Duffy, vice president of marketing, connected products and customers, LogMeIn, explains security is of the utmost importance with anything that has to do with connectivity, but particularly in the IoT.
Peggy says cyber criminals are not resting and everyone needs to focus on cybersecurity.
Peggy explains the latest research from Hewlett-Packard involving smartwatch security finds smartwatches are highly vulnerable to attacks, and that 100% of the smartwatches HP tested exhibited security flaws.
Juan Lazcano, vice president of M2M, North American Gemalto, says Gemalto supports deployment of M2M and IoT (Internet of Things) in regards to security through three basic elements including the device with credentials and data; ensure communication between device and backend is secure; and on the server side by having the same type of mechanism when securing and keeping information in safe place.
Melani Griffith, executive vice president of business development, Penthera Partners, explains how its software manages the delivery of content via consumer devices and touches on the importance of Internet security.
Peggy looks at two new security reports, one of which says that cyber criminals often get money using dated techniques that indicate companies need to be more prepared.
Peggy asks the question, if legitimate Websites such as Forbes can be compromised by a watering hole attack to deliver malware, is there any way to be safe online?
In the wake of the recent Premera hacking, Peggy evaluates the total damages caused to date and calls for CEOs to focus more attention to cybercrime threats.
As the connected-car market is predicted to explode, Peggy discusses the inevitably of hacking and questions with whom the liability lay.
Are companies doing enough with their IoT (Internet of Things) data to see an acceptable ROI? Peggy asks this, and more, on this week’s show.
With hackers working so hard to find ingenious ways to access our personal information, why make their jobs any easier, remarks Peggy as she discusses a recent survey on password behavior.
Ransomware is fast becoming the cyber extortionists’ tool of choice.
Deidre Diamond, CEO and founder, Cyber Security Network, says CEOs and company leaders need to realize the threat of cybercrime is real, and hire their cybersecurity professionals accordingly.
Scott Schober, president and CEO, Berkeley Varitronics Systems, says drones could vastly improve the process of online shopping and delivery, but could just as easily be used for acts of remote terrorism and hacking.
Seth Danberry, president and cofounder, Grid32, says businesses need to gauge their security systems with penetrative tests before any weaknesses are exploited by hackers.
With the recent announcement that Gemalto SIM cards were hacked by the governments of America and the United Kingdom, Peggy wonders what could possibly justify such a mass invasion of privacy.
Jim Drylie, Ph.D., executive director School of Criminal Justice & Public Administration College of Business & Public Management, Kean University, says that ignoring the problem is only making it worse; the key to cybersecurity is proactivity and preparation.
Scott Schober, president and CEO, Berkeley Varitronics Systems, continues his discussion with Peggy, this time explaining the potential weakness of our critical infrastructure to cyber threats.
In a special edition of The Peggy Smedley Show coming live from CWC15, Scott Schober, president and CEO, Berkeley Varitronics Systems, lists cybersecurity tips that are simple to implement, and may save you a lot of hassle and money.
BYOD (bring your own device) offers many conveniences to company employees, but it also presents risks to company networks.
Brian Zaugg, director of information security, Authentic8 Inc., explains the architectural principles underlying cyber security, and the practical risks presented my M2M and IoT.
Jim Drylie, Ph.D., executive director School of Criminal Justice & Public Administration College of Business & Public Management, Kean University, says executives are ignoring the problem of cyber security, and if they continue to do so the results will be catastrophic.
For two years, they watched and waited for opportunities to siphon money.
JD Sherry, vice president, technology and solutions, Trend Micro, tells to explain why businesses are struggling with cybercrime, what they can do prevent it and what companies can do to better to protect themselves and their employees Android devices.
JD Sherry, vice president, technology and solutions, Trend Micro, tells listeners why businesses are falling afoul of cybercrime, what they should be doing to prevent it, and how we might be helping hackers and not even realize it.
Terrorism as we knew it is changing. Jonathan Ratner, MSM, Israeli-American expert in HLS & cyber security, Six Gill discusses the evolution of cyber terrorism, and how the Internet has created a “global village,, where cyber terrorism could potentially be at anyone’s door.
With cyber terrorism in the news more and more, Peggy takes a look at how traditional terrorism has evolved, and forecasts where cybercrime will go during the coming months.
Gary Warner, director of research and computer forensics, The University of Alabama, Birmingham, explains why companies and individuals need to treat hacking like the crime that it is, and tell the authorities.
Chris Rouland, CEO, Bastille Networks, talks about measures companies should take to ensure cyber security.
Peggy Smedley talks about the rise of mobile banking and what that means for the tablet market.
Seth Danberry, president and cofounder, Grid 32 Information Security, explains how his company helps businesses by hacking them.
Victor Melfi Jr., chief strategy officer and senior vice president, Voicebox Technologies, discusses the potential of voice-controlled technology.
Peggy Smedley explains simple steps businesses can take to avoid issues with cyber security.
Peggy Smedley questions whether we have lost control of our cybersecurity and whether corporate America is taking the necessary steps to recognize today’s breed of sophisticated hackers?
Sandra Guy, reporter, Chicago Sun Times, discusses Chicago-based incubators and the changing nature of start-ups.
Scott Schober, president and CEO, Berkeley Varitronics Systems, discusses the deep and dark Web, and how sharing information after a hack can help combat them.
Peggy explains how personal devices threaten the cyber security of a business, and how private and corporate networks may not be as secure as they should.