Global fintech and funding innovation ecosystem

Cybersecurity, Blockchain And The Industrial Internet Of Things

Forbes | | Nov 6, 2018

IoT regulations and security - Cybersecurity, Blockchain And The Industrial Internet Of ThingsOn September 28, California’s SB 327 was signed by the governor, making it the first such law in the U.S. mandating internet of things (IoT) device manufacturing security provisions (a similar, though more extensive, federal bill known as the Internet of Things (IoT) Cybersecurity Improvement Act of 2017 still sits with the Committee on Homeland Security and Governmental Affairs, and I have not seen any recent activity on its development).

The new California law states that connected devices must be manufactured with “reasonable” security features. This means IoT device makers may need to start providing unique preprogrammed device passwords (instead of default passwords) or embedding functions that force users to authenticate before access is granted to the device for the first time.

Existing California law already compels businesses to implement and maintain reasonable cybersecurity procedures appropriate to the nature of the collected data, but the new legislation applies specifically to “things.” I've seen critics of the new law point out that the requirements are vague, neglect encryption and don’t address underlying bad practices that are fueling the problem.

But pretty much everyone agrees there is a problem.

See:  The growing cost of cybersecurity

Poorly secured IoT devices fueled the Mirai botnet used in the destructive Dyn cyberattack of 2016 and countless other cybersecurity nightmares. In just the past few weeks, it’s been reported that a new Hakai IoT botnet “is now growing into a looming and impending threat” that has even spawned “two different Hakai-based variants” of malware that are spreading online. And these bots are largely being powered by hijacked IoT devices.

Whether or not the California law, which goes into effect in 2020, will have any impact whatsoever in curbing the problem remains to be seen, but it signals that people outside the information-security sector are now also concerned about the security of “things” and the implications of living in our “smart” and connected world.

While botnets like Mirai are largely powered by expropriated consumer IoT devices and used for things like denial-of-service (DoS) cyberattacks, the motivations behind industrial internet of things (IIoT) cyberthreats may be much more threatening to a business's bottom line. I see particular weaknesses in the IIoT-enabled manufacturing industry, for example, where Industry 4.0 has encouraged a massive integration of information technology systems, devices and cloud resources in the supply chain — and now both operational ability and intellectual property are at stake.

The recent 2018 Spotlight Report on Manufacturing from Vectra suggested that the manufacturing industry suffers an inordinate volume of malicious internal network activity, lateral movement and reconnaissance activity (although they are a cybersecurity firm); Deloitte also touched on these vulnerabilities in a recent article. This would indicate that attackers have already infiltrated these networks and are snooping for critical assets or attempting to destroy infrastructure. Attackers could easily gain entry to these networks through imprudent deployment of unsecured IIoT devices and weak (or nonexistent) internal network controls.

Laws that widely enforce better device security best practices may present one solution to this problem, but assistance might also come from more innovative quarters.

See:  The Canada Border Services Agency Pilots IBM Maersk TradeLens Blockchain Solution

Blockchain technology, which works as a distributed database that cryptographically and immutably records every “block” of data moving through a system, may point to a more secure future for our connected devices. Blockchain is difficult to spoof. Its peer-to-peer, decentralized structure and reliance on consensus theoretically make it harder to hack. There is, by my observation, essentially no central control to break into or authenticator to fool.

For example, an attacker might digitally force entry into one poorly secured IIoT router at a company. But attempts to use that entry point to manipulate or interact with other nodes in the network could be thwarted in a blockchain model. In that case, the attacked router’s hashed record of activity would no longer match the others in the network and could not achieve consensus verification.

Continue to the full article --> here

 


NCFA Jan 2018 resize - Cybersecurity, Blockchain And The Industrial Internet Of Things The National Crowdfunding & Fintech Association (NCFA Canada) is a financial innovation ecosystem that provides education, market intelligence, industry stewardship, networking and funding opportunities and services to thousands of community members and works closely with industry, government, partners and affiliates to create a vibrant and innovative fintech and funding industry in Canada. Decentralized and distributed, NCFA is engaged with global stakeholders and helps incubate projects and investment in fintech, alternative finance, crowdfunding, peer-to-peer finance, payments, digital assets and tokens, blockchain, cryptocurrency, regtech, and insurtech sectors. Join Canada's Fintech & Funding Community today FREE! Or become a contributing member and get perks. For more information, please visit: www.ncfacanada.org

Latest news - Cybersecurity, Blockchain And The Industrial Internet Of ThingsFF Logo 400 v3 - Cybersecurity, Blockchain And The Industrial Internet Of Thingscommunity social impact - Cybersecurity, Blockchain And The Industrial Internet Of Things

Support NCFA by Following us on Twitter!







NCFA Sign up for our newsletter - Cybersecurity, Blockchain And The Industrial Internet Of Things




MaRS | Jun 11, 2024 MaRS Discovery District Job Cuts 20 Jobs and Looks to Operate a Leaner Business Model Approximately 20 positions, including several top-level responsibilities, were eliminated as a part of a recent major restructure at MaRS Discovery District, one of Canada's leading government funded innovation support organizations. Amidst financial challenges, MaRS looks to reduce hierarchy and move towards a more agile and lean structure in order to better allocate resources to programming that supports founders and encourages ecosystem engagement. See:  Corporate Venture Capital in Canada: Insights and Challenges Since its founding in 2000, MaRS has expanded its support to include a variety of tech industries, but its initial focus was on the medical and allied sciences. It has been crucial in helping businesses with advisory services and in creating venture capital projects like Graphite Ventures and the MaRS Investment Accelerator Fund. Alison Nankivell, CEO, MaRS stated: “Our path forward necessitates changes toward a more agile and lean organizational structure that reduces hierarchy and leadership roles in favor of a reallocation of resources to support programming that more effectively supports founders, fosters even greater ecosystem collaboration, and ultimately increases our impact.” Financial Overview and Key Departures Since 2019, ...
Freepik master1305 restructuring - Cybersecurity, Blockchain And The Industrial Internet Of Things
Tokenization | Jun 11, 2024 US Congress considers the regulatory challenges and benefits of tokenization On June 5, 2024, Washington lawmakers discussed the "Tokenization Report Act of 2024" (HR 8464), which is sponsored by Rep. William Timmons and co-sponsored by Rep. Ritchie Torres in the 118th Congress. The Act mandates a thorough report on the advantages and disadvantages of asset tokenization using blockchain technology, the variations between blockchain networks, the current level of interoperability, and international regulatory strategies. The Federal Deposit Insurance Corporation, the Comptroller of the Currency, the National Credit Union Administration Board, and the Board of Governors of the Federal Reserve System are to jointly submit this report. Within 180 days after the act's passage, the report must be given to the Senate Committee on Banking, Housing, and Urban Affairs and the House Committee on Financial Services. See:  U.S. House passes FIT21 with Bipartisan Support Strong regulations are required to control the tokenization of RWAs, as recent talks in Washington have shown. The Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC), among other legislative and regulatory organizations, are investigating the applicability of current securities and commodities rules to tokenized assets. The classification of digital ...
Tokenization of RWA Tokenization Report Act of 2024 - Cybersecurity, Blockchain And The Industrial Internet Of Things
Jun 11, 2024 Key Takeaways: Data breaches can severely impact businesses by eroding customer trust, halting operations, and causing legal issues. Implementing strong passwords, multi-factor authentication, and regular software updates are essential steps in securing your data. Educating employees on data security practices and using reputable IT services can significantly enhance your data protection measures. Have you ever wondered what would happen if your customer database or financial records were suddenly exposed online? Data breaches are a harsh reality for businesses of all sizes and entrepreneurs; the consequences can be particularly damaging. A single attack can erode customer trust, halt operations, and even lead to legal repercussions. But don't panic! This guide is your roadmap to data security. Continue reading to learn more. What Is Data Protection?  Data protection refers to the set of practices, protocols, and technologies employed to secure personal, business, and customer data from unauthorized access, data breach, and other forms of compromise. It encompasses various strategies aimed at safeguarding the confidentiality, integrity, and availability of data. These strategies include encryption, access controls, and regular security audits. For entrepreneurs looking to enhance their data protection, hiring Kenyatta Computer Services or other service providers can offer expert assistance in ...
Data security Center - Cybersecurity, Blockchain And The Industrial Internet Of Things
Remote Work Insights | Jun 10, 2024 The Effects of Global Digital Jobs on Canadian Markets The World Economic Forum (WEF) has published a white paper last month called 'Realizing the Potential of Global Digital Jobs' covering the possibilities, difficulties, and solutions connected with global digital jobs, as remote work continues to reshape the global labour environment. This article looks at the effects on fintech businesses in Canada, unintended consequences for urban commercial districts and a range of remote working trends to stay on top of. Global Digital Jobs The WEF report anticipated that by 2030, there will be 92 million remote digital workers globally, up from 73 million that exist today. This indicates a considerable shift towards remote work.  The number of people in economies with lesser incomes that have higher levels of education are growing.  Educated individuals capable of filling global digital positions have surged in nations like India and Nigeria.  By optimizing talent use and lowering skill mismatches across nations, global digital jobs could increase global GDP by $11 trillion by 2030. This is an interesting trend, given that there's currently a skills shortage across a number of industries in Canada.  Looking at Figure 1 chart above, ...
WEF Realizing the potential of global digital jobs cover - Cybersecurity, Blockchain And The Industrial Internet Of Things
Jun 10, 2024 Introduction Writing an invitation letter for a visa application can be a challenging task, especially if you're unfamiliar with the legal requirements and formalities involved. For residents of Ontario, Canada, creating a compelling and legally sound invitation letter is crucial. This comprehensive guide will walk you through the process of drafting an effective invitation letter and explain how an online notary services in Ontario can assist in notarizing the document to enhance its credibility and acceptance. What is an Invitation Letter? An invitation letter is a formal legal document written by a host in Canada inviting a guest to visit for a specific purpose, such as tourism, business, or family events. This letter is often a key component of a visa application, as it helps immigration officers verify the legitimacy of the visit and the relationship between the host and the guest. Why You Need an Invitation Letter in Ontario In Ontario, an invitation letter is commonly required for visitor visa applications. It helps immigration authorities assess the validity of the visitor's intentions and the host’s ability to support the guest during their stay. A well-drafted invitation letter can significantly boost the chances of visa approval by ...
Freepik Notary of the public - Cybersecurity, Blockchain And The Industrial Internet Of Things
Jun 9, 2024 In the complex world of business, having the right professionals in your network is crucial. One such indispensable professional is a business contract lawyer. Whether you're a startup or a well-established enterprise, the expertise of a contract lawyer can be a game-changer for your business. Here's why: Expertise in Drafting and Reviewing Contracts A commercial contracts lawyer has the special knowledge needed to draft and review contracts accurately. Their expertise ensures that all the necessary details are covered, reducing the risk of future disputes. With their help, businesses can be confident that their interests are protected, and all agreements are clear and fair. They carefully check every clause and term, making sure everything is legally sound and beneficial for the parties involved. Risk Management When it comes to managing risks in business, a contract lawyer is a valuable asset. They help identify potential issues before they become big problems. For instance, a contract lawyer can point out terms in a contract that might expose your business to unnecessary risks. By addressing these risks early, they help keep your business safe and avoid costly mistakes. In essence, having a contract lawyer means you have someone who is always ...
Pexels Sora Shimazaki Lawyer working in his office - Cybersecurity, Blockchain And The Industrial Internet Of Things
Crypto M&A | Jun 7, 2024 Robinhood Flies in the Face of the SEC and Acquires Bitstamp Crypto Exchange After Receiving Wells Notice While under crypto-related regulatory scrutiny from the U.S. Securities and Exchange Commission (SEC), Robinhood has announced the acquisition of the European cryptocurrency exchange Bitstamp for $200 million to boost Robinhood's crypto trading capabilities and expand its customer base in Europe. See:  SEC Issues Wells Notice to Robinhood Over Crypto Bitstamp Acquisition Bitstamp, founded in 2011 and based in Luxembourg, is a top 20 centralized crypto exchange with a reputation for reliability and security. Institutional clients trust Bitstamp for its extensive order books, dependable trade execution, high quality API access, institutional lending, staking, and the white label solutions with Bitstamp-as-a-service. Has more than 50 active licenses and registrations worldwide and can push clients to Robinhood from the US, EU, UK, and Asia. Daily trading volume of approx. $315 million serving more than 4 million customers in 100 countries according to Coinmarket cap Robinhood's Crypto Expansion In 2023, Robinhood reported $1.9 billion in total revenue, a 37% year-over-year gain. View full Q4 and 2023 financial results here. 23 million active, funded users. See:  U.S. House passes FIT21 with Bipartisan ...
Robinhood acquires bitstamp - Cybersecurity, Blockchain And The Industrial Internet Of Things
Jun 7, 2024 Becoming a small business owner can be a dream come true. It means independence, doing things your way, and if your business model works, it can be the career move you needed to stay motivated when you wake up every morning. Opening your small business and keeping it going in those early years costs money. Whether it’s paying a lease for a storefront, making sure suppliers get paid, or just giving yourself a runway to start finding clients and earning revenue, you need some cash up front to get the ball rolling. One way to raise that capital is by taking out a personal loan. A personal loan is a line of credit that you can use for any number of reasons. Unlike a mortgage or car loan, there are no hard rules about how you can spend the money. The interest rate is typically lower than a credit card. The loan can either be unsecured or require collateral. It can be a big risk taking out a personal loan to fund your small business, whether you’re just getting started or trying to keep your business afloat. Once you involve your personal finances, you’re on the hook ...
Unsplash Tim Mossholder Yes we are open sign - Cybersecurity, Blockchain And The Industrial Internet Of Things
Release | Jun 7, 2024 Zūm Rails hires Miro Pavletic to lead new AI-driven banking project A scaling Canadian fintech business Zūm Rails has announced the hiring of Miro Pavletic who joins Zūm to manage its large-scale AI-driven Banking-as-a-Service (BaaS) project. This is a key move to expand Zūm Rails' unique financial offerings and solutions. Miro Pavletic Fintech expert with a wealth of banking and finance experience, Miro Pavletic joins Zūm Rails as a key player in their newest project. Previously, Pavletic was the Co-founder and CEO of Stack, a digital challenger banking app that was acquired by Credit Sesame in 2020. See:  Züm Rails’ $10.5M Boost for North American Expansion Pavletic will lead Zūm Rails’ BaaS product roadmap, which will integrate with Zūm Rail’s current payment services and include real-time fraud assessment, identity validation, and transaction settlement capabilities. Pavletic is committed to accelerating the development and implementation of these features on a unified platform, enabling businesses to surpass regulators' open banking deadlines and utilize artificial intelligence to effectively manage risk. Key Developments and Financing Since founding in 2019 Zūm Rails self-funded its way to profitability and has become a significant player in the North American payments market. Their 'omni-rail' ...
Zum rails - Cybersecurity, Blockchain And The Industrial Internet Of Things
Jun 7, 2024 Key Takeaways: Managed IT services provide proactive monitoring and maintenance to identify and address potential issues before they escalate, ensuring smooth operations and preventing unforeseen downtime. With regular updates and patching, managed IT services keep software and systems secure and optimized, integrating seamlessly with other tools and maintaining peak performance. 24/7 support from managed IT services ensures that any arising issues are resolved immediately, minimizing disruptions and maintaining business continuity strategy for global and round-the-clock businesses. Have you ever had that sinking feeling when your computer screen freezes in the middle of an important task? Now, imagine that happening to your entire company network. Disruptions to your IT infrastructure can be a nightmare, halting operations and costing your business valuable time and money. That said, this guide will equip you with a powerful weapon against system downtime: managed IT services. It will explore how these services not only minimize disruptions but also free up your valuable resources, allowing you to focus on what matters most – running your business. Proactive Monitoring and Maintenance  Reliable IT support service providers, such as managed IT services by Antisyn, continuously monitor systems for any signs of issues. By constantly monitoring your systems, ...
Futristic virtual interface - Cybersecurity, Blockchain And The Industrial Internet Of Things

 

Leave a Reply

Your email address will not be published. Required fields are marked *

eleven + thirteen =