Sunday, October 14, 2018

How good is your cybersecurity - FigmoSecurity.com

Have you ever wondered how good your cybersecurity is for your company? Today there are basically two options. First, you can wait until you are hacked and suffer the consequences of malicious actors causing harm to your business, or second, you can hire a team of professionals to audit your security such as the people at Figmosecurity.com  There are many options for how cybersecurity professionals can test your network. The simplest is an audit the most aggressive is a penetration test. There is a whole list of the types of services provided by this company here. Figmo Security is a small group of cybersecurity professionals dedicated to helping companies protect themselves from cyber threats. There are many large corporate cybersecurity firms eager to take your money, however, few of them are willing to build enduring relationships with a customer and develop the trust needed to make real improvements in the way a company protects itself. 

Wednesday, March 8, 2017

Future danger with household robots

Something that will become more important as domestic robots become ubiquitous, is the responsibility of manufacturers to ensure the databases queried by their robots are as secure as banks. The danger that is possible here is simple and disturbing. The possibility exists for hostile actors to switch the identity of a food ingredient with a toxic household chemical.

It no longer seems like science fiction to imagine a kitchen robot that would prepare a meal or food item, the governing AI will rely upon a hierarchy of understanding most likely housed in the cloud. This is a necessity because when a robot receives instructions to make a cake the variety of what flour can look like through every kitchen in the country requires an understanding of flower that transcends simply reading the table. This transcendent understanding of what flower is will likely be queried from a cloud of the manufacturer where the robot will receive the concept of what it is looking for.

The potential for malicious actors to manipulate this exists in three distinct methods. First the broad approach, where the entire cloud is penetrated and every system is affected. This will be quickly identified and quickly remedied. This is also very similar to what would happen if a malicious actor managed to redirect all communication to a malicious cloud.

The second method is simply intercepting the communications from a single robot to individually target a household. The traffic could be selectively overwritten to re target the robot to replace very specific ingredients. This would be very hard to detect until something happened.

 The third is to penetrate the robot of a individual household and task it directly. Which if executed would be very similar to having a butler or maid in your house with malicious intent.

Encryption will be critical to securing these systems. Also building a robust cyber capability within the united states to protect citizens from devastating attacks such as this. Corporations will need to act in their self interest to ensure that the security of their systems is beyond questions. And then quietly internally consistently run penetration testing to ensure their systems are secure. 

Thursday, February 9, 2017

Sunday, November 20, 2016

google dreaming of the avengers on a starry night

Google and the emergence of the superbrain

Thoughts as of late take me to the ideas surrounding emergent artificial intelligence and the growth of information in the digital realm. One of the theorized ways for artificial intelligence to burst into existence is through an emergent process. Where a smart system is improved steadily until a tipping point where it displays sentience. It could be said that this process has already began through the growth of the internet. The back end of every search engine could be the processing element for a consciousness where the totality of the index-able content on the internet would make up the memories and experiences defining a self-hood for this entity,

What is interesting to me about this is the pervasiveness of the indexing ability of these engines. They are consistently able to discover new content and differentiate new unique content from repetition and copies. This is something that the human brain also excels at. We can readily recognize a new song that we have not heard before.

Generating new unique information is easy. Connect a random number generator to a website and you have an unending stream of unique information (and sometimes strange). What is difficult is to produce information that is meaningful and new. We only have a small number of expert systems that are capable of generating new information that is meaningful. IBM's Watson has the ability to synthesize large amounts  of information and discover new possibilities that have not been explored yet; Google's deep dream is a powerful visual example of exploring new possibilities with a large starting data set.

The next step to connecting these three portions of the internet will be to grow these content producing networks to the point of ubiquitousness so that the whole internet's ability to produce new ideas is as vast as it's ability to catalog and evaluate them. When this point is reached the ability for the internet to grow by itself will be unending.

That is why I think it's very interesting to consider how small powerful seeds of information can have a larger impact on the whole of the entity. Historical facts and content serve as the foundation for large ideas today. This encourages me to build ideas to contribute to this mind in gestation. So that when borne it will have the largest and firmest foundation to stand on