Smart Cities & The Internet of Things (IoT)
14.1K views | +0 today
Follow
Smart Cities & The Internet of Things (IoT)
Our world is urban: cities will be smarter, with informatics, open data networks, sensors and services
Your new post is loading...
Your new post is loading...
Scooped by Judy Curtis / SIPR
Scoop.it!

Smart Cities Predictions for 2019

Smart Cities Predictions for 2019 | Smart Cities & The Internet of Things (IoT) | Scoop.it
While 2018 was filled with a number of successful smart city deployments, it also revealed significant challenges that will only intensify in years to come. The most pressing challenge to be addressed throughout 2019 is earning the public’s trust in smart city projects. Towards the end of 2018, we saw major data privacy concerns emerge from citizens. From these concerns a heated, but healthy discourse between citizens, local governments, and private sector companies rose to mainstream media prominence. Citizens’ expectations of privacy have begun to challenge the murky data privacy policies described by many in the private sector. 2019 will be the year of the smart city for the citizen.
Scooped by Judy Curtis / SIPR
Scoop.it!

A New Way to Track Down Bugs Could Help Save IoT

A New Way to Track Down Bugs Could Help Save IoT | Smart Cities & The Internet of Things (IoT) | Scoop.it
New research advances techniques for finding and exploiting known vulnerabilities in IoT devices automatically.
Judy Curtis / SIPR's insight:
The threat of automated IoT vulnerability finders is a genuine concern. "Absolutely it is coming," says Anders Fogh, a malware analyst for the German security firm GData. "We are waiting for the vendors to realize that security is relevant. They need a dose of bitter medicine." Other researchers are beginning to work on large scale IoT firmware analysis and automatic n-day mining projects as well, acknowledging a future in which attackers can fully exploit IoT vulnerability.
Judy Curtis / SIPR's curator insight, February 14, 2018 5:36 PM
The threat of automated IoT vulnerability finders is a genuine concern. "Absolutely it is coming," says Anders Fogh, a malware analyst for the German security firm GData. "We are waiting for the vendors to realize that security is relevant. They need a dose of bitter medicine." Other researchers are beginning to work on large scale IoT firmware analysis and automatic n-day mining projects as well, acknowledging a future in which attackers can fully exploit IoT vulnerability.
Scooped by Judy Curtis / SIPR
Scoop.it!

5 Smart City Tips | Smart & Resilient Cities

5 Smart City Tips | Smart & Resilient Cities | Smart Cities & The Internet of Things (IoT) | Scoop.it

Karen Tay, Singapore's Smart Nation director,  was recently in Washington D.C. to run a workshop for the World Bank on how to develop “smart cities."  She says: “'Smart cities' is honestly a buzzword... when I get invited to speak, most people expect me to start with cool tech like AR, VR, AI, modeling and simulation, blockchain and the like. The fact is that cities are complex ecosystems with very established ways of operating. If we want to disrupt them with technology in a way that benefits the masses (i.e. not just the upper middle class), we need dedicated work from the ground-up, coupled with political commitment." Karen Tay's five tips for smart city efforts come from conversations and projects with smart city leaders around the world.

Judy Curtis / SIPR's insight:

Building a smart city is ultimately about creating momentum throughout society to deploy tech for public good. 

No comment yet.
Scooped by Judy Curtis / SIPR
Scoop.it!

IoT Security in an Age of Insecurity | IoT For All

IoT Security in an Age of Insecurity | IoT For All | Smart Cities & The Internet of Things (IoT) | Scoop.it
Takeaways from a talk on IoT security at a New America event in D.C. include two-factor authentication, encryption methods, and more.
Judy Curtis / SIPR's insight:
Discussions about the Internet of Things (IoT) often focus on a “Security vs. Privacy” paradigm. However, last month author Susan Landau emphasized instead that discussions should focus on “Security vs. Security” at a New America event titled Listening In: Cybersecurity in an Insecure Age.

In her same-titled book, Landau’s historical perspective, legislative knowledge, and cyberattack descriptions make a convincing case for the need to secure our data.

She describes how security has matured slowly leading up to today’s strong-encryption found in corporate, government, and military environments.
1
Judy Curtis / SIPR's curator insight, February 14, 2018 5:47 PM
Discussions about the Internet of Things (IoT) often focus on a “Security vs. Privacy” paradigm. However, last month author Susan Landau emphasized instead that discussions should focus on “Security vs. Security” at a New America event titled Listening In: Cybersecurity in an Insecure Age. In her same-titled book, Landau’s historical perspective, legislative knowledge, and cyberattack descriptions make a convincing case for the need to secure our data. She describes how security has matured slowly leading up to today’s strong-encryption found in corporate, government, and military environments.