Tag Archives: Information security

Autonomous Vehicles and All That Data

In an earlier post, we discussed the potential ownership models for autonomous vehicles, also known as driverless cars (“AVs”). Models range from true traditional ownership as we understand it today, to licensed-based models (vehicles owned by someone else but you can use them on an exclusive or non-exclusive basis), to service-based models (you do not own the vehicle, but you can call it when you want it, e.g. cab, Uber).  In this post we will explore the data-intensiveness of autonomous vehicles, the impending data “land grab,” and who will own and control all of the data generated by AVs. An …

[ CONTINUE READING ]

Cyber Security and Social Engineering: A Big Low Tech Problem

Headline-grabbing cyber hacks of email accounts belonging to celebrities, corporations, government officials and political campaigns are becoming the norm.  Cybersecurity intended to guard against these acts brings to mind high tech computer hardware and software fixes delivered by knowledgeable IT professionals, who are expected to prevent network intrusions, stolen passwords, viruses, ransomware attacks and other hacks. But the most recent notable cyber hacks were not caused by high tech espionage.  Rather, they were the product of low tech social engineering – the use of deception to manipulate users into divulging confidential passwords and other personal information.  This kind of hack …

[ CONTINUE READING ]