Toggle light / dark theme

I was waiting for this HIPAA’s new guidelines for mobile apps (focuses a lot on IAM); this is only the first wave. We will see more when more AI is launched.


Federal regulators have issued new guidance, including material to clarify for healthcare entities and software developers various scenarios where HIPAA regulations might apply to mobile health applications, including situations when patients use smartphones to collect or transmit personal health data.

See Also: 2015 Breach Preparedness and Response Study: The Results

Some privacy and security experts say the new mobile application guidance material from the Department of Health and Human Services’ Office for Civil Rights addresses a topic that is not only a current source of confusion for many covered entities and business associates, but also is likely to become increasingly complex as more consumers use smartphones and other devices to help manage chronic illnesses and other health issues.

Read more

I believe that AI holds a lot of promise and many great things; however, we have to correct some very critical issues 1st before compound a huge issue that we have today. And, that is Cyber Security and re-establish trust with our consumers and customers. Without these 2 being fully addressed; you will compound these two challenges with AI plus run the risk of having an IoT that most people will not wish to use due to hackers, bad data, etc. Not to mention lawsuits for Wi-Fi connected robotics that were hacked and injured or worse some innocent person.

I believe need to ensure priorities are in order before we make things worse.


Unexpected convergent consequences…this is what happens when eight different exponential technologies all explode onto the scene at once.

This post (the second of seven) is a look at artificial intelligence. Future posts will look at other tech areas.

An expert might be reasonably good at predicting the growth of a single exponential technology (e.g., the Internet of Things), but try to predict the future when A.I., robotics, VR, synthetic biology and computation are all doubling, morphing and recombining. You have a very exciting (read: unpredictable) future. This year at my Abundance 360 Summit I decided to explore this concept in sessions I called “Convergence Catalyzers.”

Read more

Lack of good Cyber Security across the net, will continue to be a key reason why AI in general will not deliver the return on new AI tech products and robots / devices. $3+ million in ranson may not be that large to mid size and large tech companies; however, it is everything to small businesses and small businesses and consumers is what keeps tech in business.


Hospital staff severely impeded in their day-to-day work.

Read more

Nice article; something that I agree very much with is the perspective that both Cyber Security is intertwined with technology innovation and adoption. Tech and other companies creating products or even services that leverages the net, can easily see their revenue potentials impacted due to poor Cyber Security. Example, Hello (Wi-Fi) Barbie by Mattel; when it was announced that the doll was indeed hackable; many buying consumers buying for their children left her on the shelf.


Hackers use innovative thinking when breaching systems, why can’t government?

by Larry Karisny

February 14, 2016.

U.S. Office of Personnel Management

Read more

I believe it is wonderful to think about cognitive computing. However, as a fellow CIO & CTO, I would suggest a key priority has to be focused on Cyber Security until it is resolved; or in a better position to proactively blocker would be intruders. Without a solid Cyber Security plan and model in place and operational; your cognitive computing capabilities will be worth nothing in the end once hackers are helping themselves to your IP and other information as well as your AI machines.


The news comes from the recent IBM Institute for Business Value study, “Redefining Competition: Insights from the Global C-suite Study — The CEO perspective.” Researchers interviewed more than 5,000 C-level executives worldwide about their perspectives on a variety of technology issues, including the importance of mobile solutions, cloud Relevant Products/Services computing, and the Internet of Things.

Torchbearers and Market Followers.

Cognitive computing, which involves developing computing resources that are capable of mimicking the way human brains work to tackle increasingly complex problems, emerged as one of the most important issues likely to confront business executives in the near future.

Read more

China’s public report on their own Cyber Security Strategy — don’t get too excited; it is a “public” version of their plan (mean nothing in depth).


New cyber warfare unit

While China was assessed to have cyber warfare capabilities for quite some time, the declaration by its Central Military Council of the formation of a new military branch focussed on digital battleground technically called Strategic Support Force on 1st Jan. 2016 confirmed this. This new force is mainly aimed at providing resources capable of protecting China’s cyber and space security. On this occasion Xi pointed out that this force is central to achieving the “Chinese Dream” suggesting its importance.

This development has not come as a surprise. Last year China had released it’s first-ever White Paper on military strategy [entitled “China’s Military Strategy”] which stressed on need to shift to “active defence” and emphasized China’s commitment to “winning informationized local wars” as also becoming a maritime power. The White Paper also contained the first official acknowledgement of China’s commitment to building a cyber force with the capability to engage in offensive cyber operations.

Read more

Very good read; and hints at something that I have been highlighting for a while around AI, NextGen transformation and adoption, etc. One very large brick wall that I highlighted in my latest posts around 5 areas that need to be address for AI to be adopted more broadly is Cyber Security.

If we do not get Cyber Security address soon around hackers, cloud, etc. AI (including robotics), brain interfaces, etc. will be either rejected or very limited in its adoption. It is just that simple.


What are CISO’s (Chief Information Security Officers) worrying about in 2016?

According to the recent 2016 Security Pressures report from Trustwave, theft of information from a successful breach or cyber-attack ranks as the top worrying outcome for nearly two-thirds of respondents.

With the Identity Theft Resource Center placing the number of records exposed from data breaches in 2015 somewhere around 170 million, it’s no surprise.

Read more

This story crosses into the realm of satellite launchers and commercial space, but has troubling implications for international security. I personally am a bit more worried about North Korea’s ability to secure ballistic sub-launched weapons of mass destruction since I think that they offer more stealth than an ICBM silo, which we can fairly easily detect.


North Korea’s potential intercontinental ballistic missile (ICBM) threat may be stealing headlines, but the rogue state’s interest in submarine-launched nuclear weapons is arguably even more worrisome.

Read more

However, one also must look at the past for insights and guidance on things that were done wrong to ensure bad history is not repeated.

Therefore, let me share with you a part of history that we need to be aware of and protect our future from ever repeating again.

Many folks have never heard of Poor Farms in the South and Poor Houses in some parts of the Midwest. Before soc. Security and Welfare we had poor farms/ houses. They date from the late 1800s until 1930s.

Poor farms/ houses were often filled with the elderly and others that had no money or anyone to take care them. People often worked the land for 16+ hours days, dressed in rags, and had very little to eat. Once you were there you could not leave ever until you died.

My grandfather always taught us that if Social Security and Welfare were ever eliminated, that a model of Poor Farms/ houses would return.


Poorhouses promised to be a much more efficient and cheaper way to provide relief to paupers.

Read more

More Intel Concerns


James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries.

As the Internet of things has grown, so has the debate about security around it.

Much of the focus has been around the fact that with billions of new systems, devices and sensors connecting each year, the attack surface for hackers continues to widen. Add in a lack of security in many of these connected devices and their growing popularity in homes and businesses, and the issue becomes even more concerning.

Read more