top of page
Search
Writer's picturemadhukeshwar bhat

Cybersec Newsletter- Q3’24

I am bringing out this quarterly newsletter, summarizing my key article publications during the third quarter of 2024. Thanks for the great responses to my cybertalks It has been an exciting journey so far.




Generative AI is the talk of the town. While this has brought revolution, it has also brought a host of security risks. With so many serious risks, should we let go of this new tool with tremendous potential? The answer is no. We must be careful when implementing new-gen AI tools. How powerful AI tools are, if they are ungoverned, we would be on the losing side. Thus, robust governance is the first thing to have even before implementing Gen AI. Government regulations would be slow; many come only after a major issue. Thus, I would not wait for regulations to appear but rather start putting the organizational framework for generative AI usage.





We have adopted so much of IoT (Internet of Things) into our lives that we can’t think a day without them, from smart homes, and internet-connected cars to smart kitchens.

  • We are able to start our car from our smartphones

  • Control our air conditioners with our fingertips from our cell phones

  • Metro trains can be controlled from computer systems

  • Our dams can be operated via computers


The list goes on….

How can IoT be secured?


  • Secure configuration before start using

  • Network segment IoT devices from the main network

  • Education and awareness

  • Traffic monitoring

  • Regular updates to firmware




In the Artificial Intelligence (AI) and Machine Learning (ML) era, it is quite interesting to see how these fit into existing ways of doing things. One of the crucial security domains is Identity & Access Management (IAM). With the advent of AI and ML, how would IAM change? Is IAM needed for AI and ML to succeed?




In the virtual world or online universe, there is no possibility of humans validating the authenticity of someone or something trying to interact with the computer system. Hence, there needs a sophisticated and secure mechanism to ensure the right entity can only get into the computer. That is where authentication comes into the picture. Authentication plays the role of gatekeeper ensuring secure access.


0 views0 comments

Recent Posts

See All

Comments


Post: Blog2_Post
bottom of page