Also in this playlist...
This transcript is automatically generated
Simplify the information about a person that we lot more than we couldn't describe.
Is put out on the web and there's no barrier now can you think about this from the perspective of national security and economic livelihood and protection brands -- an actual privacy there's -- -- this phenomenon has impacts.
It all over the course.
-- the talking about the cyber threat all week that's a former -- governor Florida Jeb Bush was on Fox News radio I'm not bright she'll be show talking about the the well known hacking as some of the members of his family and -- email accounts but today.
We're gonna take a look at the cyber threat as it applies to new technologies in the vaulted CEO joins us general partner at security growth partners as well.
The -- around it's good to have you a lot thank you for coming in.
We had conversations earlier we talk all the time and I think people associate the cyber threat.
In with their desktop computer put all of us now have some sort of a mobile device.
And do you think that's the not -- the next.
Threat but the current threat what what about cyber threats to a mobile device when we need to know.
Well it's it's.
It more no doubt about it mobile devices are one of the battle lines right in the current one cyber war to people wanna come out of some -- minutes not to did not just gone after big companies security.
But did they like about -- individuals on their phones or companies.
In many cases that are issuing these mobile devices to their employees is it easier to attack mobile devices that it is a protection computers are well it it's Pulitzer remember -- quarter phenomenon that happen.
Was that didn't -- these mobile devices we're not.
Developed with business -- in -- and there are developers consumer devices -- And we experience what we call an outside in phenomenon word technology that was developed for consumers for example an -- -- Is now being embraced by people in businesses -- -- companies will.
So whether it's just -- and how that affects the dynamic right because about -- -- a lot of us thought iphones when they first came out.
And then a few years later slowly but -- company started issuing them to some of the employees for years it was just the black bears all over the place -- and one of the reasons we were told had blockers.
Is more secure and we in the IT departments can keep -- it.
Keep you safer using a black or is that true is that still true on the Blackberry does have some elements of security built into it but.
-- -- But what's happening -- zero that.
Has been to a very large extent you know relegated to use sort of you know second tier type of solution where people are using iphones android phones and another.
Remember these Smartphones are not just cell phones.
-- in fact little computers.
Yes we also happen didn't used and make cell phone calls text sent text messages in communicating and variety of ways.
And they would these devices never had the security built into them so that we protect ourselves or -- -- companies protect themselves are we doing enough right now hours of more.
To needs to be done.
Quarter to -- -- -- two step process step number one the devices themselves have to be managed step number two that they got.
On the devices have to be mention that the -- includes by the way voice and text and so forth.
-- nearly enough one of the who single most important factors into a tax right through these mobile device is good old fashioned -- dropping.
Really so what we'll go to RadioShack just on the street and spend few hundred dollars.
By all the equipment they need to be able to eavesdrop on your cell -- it's really not that difficult to do.
That is a little bit scary we -- -- its -- -- -- and -- -- -- be scared because we -- billions of dollars in corporate espionage.
Are taking place through that very attack vector and we hear about these things have taken place in China but McCain's face -- all over the world.
I guess is whether reluctant to give the president you know Blackberry -- and has now that supposedly safer about for the good news is right.
We're talking about innovation.
Right in cyber security is that there are companies and full disclosure I'm on the board of directors of this company right coming in Bethesda Maryland called -- spend this develop the product called trust chip.
-- -- gets inserted into a mobile device and then that trust chip.
A hardware anchor that -- -- the data.
That voice that text and and one of these phone so that would be on an individual phone you put the chip into the phone credit cards you can buy this phone their conversations -- be encrypted the last thing I wanna ask you about before we go is the it's the cloud because a lot of people now and a lot of companies more and more are moving everything they do.
Into this so called -- and we.
We know it's -- we know it's great we know all the -- -- -- but are we at risk there.
As well well also the pro cloud does come with a lot of -- right.
It's more cost effective more scalable -- years -- -- -- -- sold as the panacea to our IT -- -- by the -- a lot of those things are true.
The flip side however is one of ownership and control of our data.
And we what the cloud is in in a nutshell is that we take our data and I'm speaking here but only about corporate data -- everything is trees for troops right consumers.
Our data is sitting in essence -- yeah and someone else's environment right under someone else's control how we protect that.
So again as security innovation is the key.
I have a company that there -- -- called volt lives of full disclosure on that but there are.
My can be others we've developed advanced encryption technologies that let business is encrypted.
They're data -- before it goes to the cloud provider and it's just a safe formed almost sit well in many ways -- can actually be safer -- because the cloud providers that those that are advanced are actually investing significant sums of money into protecting their infrastructure and -- the flip side is that we as business people.
How do you.
Mean sure that.
Make sure that we maintain ownership and control by data tonight we've learned a lot this week -- a lot you just last few minutes we have to -- now but they're allowed to -- -- CEO.
Thanks -- -- -- -- -- some point -- it takes -- -- to get through some of these issues -- effects of complex topic and this is just scratching the surface of it thank you thank you very much right.
Filter by section