Skip to content

Month: June 2018

Oracle Hit From All Sides: Iaas Cloud and Programmatic

Summary: Infrastructure as a service (IaaS) is the fastest growing cloud segment and will continue to be with AI, machine learning and connected cars. Gartner, an authority in tech analysis, placed Oracle in the “niche player quadrant” (not the leader quadrant) for Infrastructure as a Service (IaaS) May 22. In addition to IaaS, Oracle’s Data as a Service business model will weaken as marketers fail to get proper consent for ad targeting. Cloud infrastructure is hot right now and for good reason. The world increasingly relies on cloud data centers due to server virtualization, smartphones, movies and entertainment, chatbots, office…

Top 5 Security Risks for Connected Cars

The global market for connected cars will grow by 270% by 2022 with 125 million passenger cars expected to ship worldwide between 2018 and 2022.1 By 2020, it’s estimated that UK, France and Germany will reach 100% connected car penetration. Growth in the European region is due to the eCall mandate which requires new cars to automatically dial the 112 emergency number in the event of a serious accident.2 While North America and Europe lead in the highest percentage of shipments, China accounts for 32% of shipments. The list of connected features enjoyed by consumers that add more opportunities for security attacks…

Measuring Mobile Ad Performance: Why We Need to Borrow a Metric from TV

This article originally appeared in VentureBeat. By all accounts, mobile advertising is the wave of the future. Mobile ad spend is projected to increase 430 percent between 2013 to 2016, when it’s expected to surpass $100 billion worldwide, according to eMarketer. By 2019, overall ad spend will go on to surge to an estimated $200 billion. This is record-breaking growth, and it’s no wonder we are seeing this level of investment considering we’ve seen mobile usage recently exceed desktop. It’s exciting to be in mobile today. You couldn’t ask for more users, more eyeballs. Yet  there are still a few unanswered issues.…

Who is Responsible for the Data Security of 50 Billion IoT Connections?

This article originally appeared on IAPP.org, the International Association of Privacy Professionals. “No matter what happens, don’t panic,” were the words used by hackers just before they hacked a 2014 Jeep Cherokee. It wasn’t your typical hack, where credit card information is stolen, or a denial of service attack is propagated, or a website is taken down. This incident involved disabling the transmission and brakes of a vehicle driving 70 mph. In other words, this is the kind of hack that could take someone’s life. Car hacks make juicy headlines, but dating back as far as 2007, we saw researchers demonstrate…

Drones Over Hollywood: An Aerial View of Video Security

This post originally appeared in Exchange Wire. As NAB comes to a close for another year, aerial robotics and drones are once again a popular topic of conversation. The uptake of drone usage in content production is soaring; but it seems that even drones are susceptible to malware and bot attacks. ExchangeWire speaks with Beth Kindig (pictured below), product evangelist, Intertrust, about how the popularity of drones needs to make way for effective security measures. What do the Matt Damon film ‘The Great Wall’, Mary J. Blige’s newest music video, and ‘Fast and Furious 6’, all have in common? Each contain…

Is TV Advertising Dead? Ad Revenues Suggest Otherwise

Ideally, advertisers experience the same brand recall from TV combined with the audience-based targeting advertisers use in digital. By combining the best qualities of television with the addressability of digital, advertisers could have targeted, dynamic video ads in TV-quality streaming environments. Cord cutters are getting a lot of attention these days. Perhaps justified considering 95% of homes with TV have access to services that can be viewed on another screen, contributing to the lowest growth rate ever for worldwide pay TV subscribers. Globally, Asia-Pacific saw the biggest gains adding 2.4 million homes compared to the Americas which added 850,000 homes…

New Trends in On-the-Go Entertainment for Flights and Cars

Smartphones have popularized the concept of on-the-go entertainment with users now spending over five hours per day on their mobile device. This steady demand is great for businesses as long as this usage has reliable 3G or 4G broadband, or WiFi access. Data efficiency decreases the farther one travels from metropolitan areas, whether that be by plane or automobile, whereas the demand for entertainment is constant. In-flight entertainment systems and broadband are popular with 70 percent of survey respondents citing they would be willing to pay 7 USD for connectivity[1]. Total revenue from these passenger connectivity services will reach $5.4 billion by…

5 Ways Hackers Attack Mobile Devices and Applications

Hackers go about achieving their goals with reverse engineering software to find vulnerabilities they can exploit, data they can extract, or ways to modify the software to do something it was never intended to do. The primary consequences of applications getting hacked include financial loss, destroyed brand reputation, exposure to liability, and regulatory risk. Over 7 billion identities have been stolen in data breaches over the last eight years equal to one data breach for every person on the planet.   Why do Hackers Attack Mobile Devices and Applications? In order to understand threats, we must understand what hackers are trying…

How Mobile Devices and Cloud Computing Changed Security

Prior to the advent of mobile computing, security was limited to corporate IT assets that were often physically secured in facilities owned and managed by the company. According to a recent SANS Institute study, organizations spend as much as 12 percent of their IT budget on security. In a Ponemon Institute study, it was found that organizations have a 27.7 percent probability of having a material data breach in the next 24 months at an average cost of $3.62M. Meanwhile, the world of computing has changed. Security is not just about physically secure data centers and corporate controlled computing assets. Instead,…