Categories
Education Reading

Latest Read: Profit over Privacy

Profit over Privacy: How Surveillance Advertising Conquered the Internet by Matthew Crain.

Profit over Privacy: How Surveillance Advertising Conquered the Internet by Matthew Crain

Matthew holds a PhD from the University of Illinois, Urbana-Champaign. He is an assistant professor of media and communication at Miami University of Ohio and previously taught at Queens College, City University of New York.

The contemporary internet’s de facto business model is one of Surveillance has been the new black. While browser cookies follow us around the web, Web beacons can track and harvest every Google search, every webpage visited, In fact, on a growing number of global websites, beacons know where you click. Yes indeed they know everything about you and are monetizing all of your online activities every day.

In Profit over Privacy, Matthew is delivering a solid historical beginning to the billion dollar surveillance advertising business.

In fact, Facebook posted revenues over $319 billion in 2021 alone. Surprised learning this is below their 2020 revenue? The loss of our privacy is via Facebook, Google, and Amazon. They certainly resell our online activity to data brokers.

Matthew is tracing this surveillance advertising back to the Clinton administration. This includes the launch of the country’s Nation Information Infrastructure and how the long established Information Infrastructure Task Force (IITF) designed a safe approach which did acknowledge the coming online profiling of citizens. The FTC also looked to consumer empowerment. But in America, politics ran amok.

Categories
Artificial Intelligence Cyberinfrastructure Education Reading

Latest Read: Cybersecurity: The Insights You Need

Cybersecurity: The Insights You Need from Harvard Business Review.

Cybersecurity: The Insights You Need from Harvard Business Review

So let’s start with the end in mind to avoid all misunderstandings: this is targeted to every leader and board member regardless of market or industry. They simply must fully comprehend why cybersecurity has been and always will be an ongoing risk.

This is a well written, high level and most importantly a non-technical overview of cybersecurity. This risk can no longer be overlooked by organizations and delegated like it was 1994. Today more than ever before cybersecurity impacts your bottom line, including non-technology based organizations.

And in 2024 we can simply cut to the chase. If your organization’s cybersecurity service is not AI based, it is time to pivot to a vendor that deploys machine learning services to protect your organization, your data and most importantly, your customer data. Just query your insurance carrier for a list of approved vendors that deploy AI cybersecurity services. For the most part the pandemic made this pivot mandatory.

In fact, cyber risk management can no longer be isolated to your organization’s CIO and CISO. This is simply an organization-wide issue. Today every organization’s technology services group have become the key component for organizational success.

Categories
Education Innovation Reading

Latest Read: Cyber Crisis

Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World by Eric Cole. He holds a Masters in Computer Science from New York Institute of Technology and PhD in Information Technology from Pace University.

Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World by Eric Cole

Eric is the founder and CEO of Secure Anchor Consulting and today is a member of the Forbes Technology Council.

He began his career as Program Manager & Technical Director for the CIA. His career moved to cybersecurity leadership roles at several companies including his role as Chief Scientist & Senior Fellow at Lockheed Martin.

For over ten years he held leadership positions at SANS including Dean of Faculty and Director of Research; Architecture Director of Cyber Defense Curriculum. He has been interviewed on CNN, Fox, CBS, and NBC. In fact, Eric was one of the authors of the Nuclear Regulatory Commission’s cybersecurity guide.

The world we live in today post pandemic is different. Most do not realize the ground has shifted under their feet. Eric is simply addressing that while you may read about major cybersecurity attacks perhaps five times a year. However the stories shared certainly indicate attacks are happening every day. Since the pandemic, ransomware attack are occurring every ten minutes.

Categories
Education Reading Technology

Latest Read: The New Normal in IT

The New Normal in IT: How the Global Pandemic Changed Information Technology Forever by Gregory S. Smith. Gregory is CIO for the American Kidney Fund and previously served in the same role for Pew Charitable Trusts and the World Wildlife Fund.

The New Normal in IT: How the Global Pandemic Changed Information Technology Forever by Gregory S. Smith

He is an adjunct professor at Georgetown University and a former adjunct professor at Johns Hopkins University. The New Normal in IT is part of Wiley’s CIO Series.

The pandemic certainly changed everything. The information technology industry was no exception. The downstream impacts placed tremendous pressure on IT teams to maintain service delivery as the world went home and Zoom entered our lexicon.

Reflecting upon this move away from the office, how have IT leaders communicated the change necessary now and moving forward? Change is indeed hard.

We all witnessed the fundamental shift regarding remote work. From optional to mandatory over the next 18 months. How many organizations scrambled like mad to secure and deploy to every employee a laptop?

Can you recall the immediate infrastructure upgrades stood up in weeks versus months? IT faced many critical challenges starting in March 2020. Yet, our IT infrastructure teams kept delivering in those early weeks in order to keep their organization alive and employees functioning.

Categories
Cyberinfrastructure Education Reading Technology

Latest Read: Click Here to Kill Everybody

Click Here to Kill Everybody, Security and Survival in a Hyper-connected World by Bruce Schneier. He is a fellow at the Berkman Klein Center for Internet & Society at Harvard University, lecturer in Public Policy at the Harvard Kennedy School, and board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project. He is also an Advisory Board Member of the Electronic Privacy Information Center and VerifiedVoting.org.

Click Here to Kill Everybody Security and Survival in a Hyper-connected World by Bruce Schneier

Consequently, Bruce details many key issues in computer security that require the leadership and legislative pen of Congress. I certainly could not have picked a better time to read this book. My review is certainly just scratching the surface of his book. Bruce has communicated a much needed story for every consumer.

Above all, consider the 2021 Colonial Pipeline ransomware attack, the 2016 attacks upon our voting infrastructure, or even China’s digital espionage stealing almost every aspect of American innovation.

Do you think the internet is still growing in size? It is not the number of people, but rather the millions of new devices that pose increased risks. Therefore Bruce is calling for policies to protect these devices, knows as the Internet of Things (IoT). Examples of cyber attacks upon automobiles, electric and nuclear plants, medical devices and even airplanes is certainly proof that we are at greater risk.

A different era of industrial controls

Above all, cyber risk originates from different time in history. Besides, in the 1950s did consumers in South America have access to the internet? Any talented programmer in South America had no means to hack conventional hydroelectric dam controllers. However, today this is a reality. So then, the programmatic controls for any damn in American could not have envisioned this threat:

former National Cybersecurity Center director Rod Beckstrom summarized it this way: (1) anything connected to the Internet can be hacked; (2) everything is being connected to the Internet; (3) as a result, everything is becoming vulnerable.
p. 27

At the same time, we really don’t have to look forward, but rather back at the innovations created in the 1950s and 1960s that launched the connected internet.