Autonomous Cars In, Big Data Out In Gartner Hype Cycle - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
Autonomous Cars In, Big Data Out In Gartner Hype Cycle
Threaded  |  Newest First  |  Oldest First
Ariella
50%
50%
Ariella,
User Rank: Author
8/19/2015 | 3:09:15 PM
breach
<Given the abundance and scope of massive data breaches occurring in the last year -- Ashley Madison, anyone? -- one might expect more attention in this segment.>

Indeed, that's my view, as well. I get the impression, though, that the industry is not at all proactive about security. They're all waiting for their own barn door to be opened before coming up with a plan, and it's not evne of a signal to them that other barns have been breached. 
larryloeb
50%
50%
larryloeb,
User Rank: Author
8/19/2015 | 4:44:29 PM
Re: breach
Washington may force some cybersecurity down thier collective throats though.
Ariella
50%
50%
Ariella,
User Rank: Author
8/19/2015 | 4:54:05 PM
Re: breach
Already proposed for cars back in July.  Senators Edward J. Markey (D-Mass.) and Richard Blumenthal (D-Conn.) introduced legislation under the somewhat cumbersome title ''Security and Privacy  in Your Car Act of 2015'' or the more catchy''SPY Car Act of 2015'' to offer some transparency and protection for people who drive connected cars. Making the case for  for the law, Senator Blumenthal pointed out, "Rushing to roll out the next big thing, automakers have left cars unlocked to hackers and data-trackers."

 
larryloeb
50%
50%
larryloeb,
User Rank: Author
8/19/2015 | 5:11:31 PM
Re: breach
Well, i was thinking more broadly than just cars.

There is a big movement in Washington to justify domestic spying under the rubic of cybersecuity; but that's another screed altogether.

My hype list would have security in huge bold letters. I think it may be the topic for the next year, in its various forms.
Ariella
50%
50%
Ariella,
User Rank: Author
8/19/2015 | 5:33:32 PM
Re: breach
In the US, they're still sticking to self-regulation for the industry surrounding IoT. In fact, the Online Trust Alliance (OTA) recently published a draft trust framework recommending specific best practices for data privacy and protection manufacturers should follow
larryloeb
50%
50%
larryloeb,
User Rank: Author
8/19/2015 | 6:32:58 PM
Re: breach
I wait for all the first breach though a Cisco router (ROMCONN, anyone?) that burns a house down through a Nest thermostat.

Or something like that.

It will take some disaster to get the public's attention.
Ariella
50%
50%
Ariella,
User Rank: Author
8/19/2015 | 7:49:04 PM
Re: breach
@larry Unfortunately, that's the way things go. Until then -- and I've heard words to that effect from somene directly -- they say, "the benefits still outweigh the risks."
larryloeb
50%
50%
larryloeb,
User Rank: Author
8/19/2015 | 8:45:53 PM
Re: breach
Isn't that what GM said about all those ignition defects too?

Karma is a bitch.
Ariella
50%
50%
Ariella,
User Rank: Author
8/19/2015 | 8:47:00 PM
Re: breach
That it is.
SaneIT
50%
50%
SaneIT,
User Rank: Ninja
8/20/2015 | 8:07:43 AM
Re: breach
I suspect what we'll see first is blackmail via Google and Amazon's hub products that are listening in on every conversation in the house.  A phone call warning a home owner that the conversation they had about how much they hate their job is about to be posted on the companies Twitter page, or someone gets mad at their neighbor because their dog is loose and they make some idle threat.  Then the police show up with a recording of the conversation in the house.  We're opening ourselves up for this and not even thinking about security at this point. 
larryloeb
50%
50%
larryloeb,
User Rank: Author
8/20/2015 | 8:13:03 AM
Re: breach
Well, Amazon's Echo is supposed to keep the voice stream local until it hears the trigger phrase.

I suppose a trigger could be set downstream to it, and the voice uploaded.

But this is the sort of hack some laptops are vulnerable to, where the cameras get turned on remotely.

Unless you are ready to go off the grid, you can be tracked. But its your smartphone that may be the biggest threat vector, not the Echo. Yet, anyway.


State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
News
COVID-19: Using Data to Map Infections, Hospital Beds, and More
Jessica Davis, Senior Editor, Enterprise Apps,  3/25/2020
Commentary
Enterprise Guide to Robotic Process Automation
Cathleen Gagne, Managing Editor, InformationWeek,  3/23/2020
Slideshows
How Startup Innovation Can Help Enterprises Face COVID-19
Joao-Pierre S. Ruth, Senior Writer,  3/24/2020
Register for InformationWeek Newsletters
Video
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll