Mobile Banking: User Demographics, Frequency of Use, Popular and Missing Features

MobileBanking_SP1

MobileBanking_SP2

Source: S&P Global Market Intelligence

Posted in Misc | Leave a comment

Perspectives on Deep Learning

deep_learning_meme_keras.png

Source: Piotr Migdal

Posted in deep learning | Leave a comment

Funding Surge for Robotics Startups

Robotics_Funding2017.png

Crunchbase:

Thirty-nine US robotics companies raised $519 million in the first quarter of 2017, according to a Crunchbase News analysis. This compares to $553 million raised in all of 2014 by 134 companies, implying that deal sizes are getting larger.

 

Posted in Robotics | Leave a comment

6 In-Demand Internet of Things (IoT) Security Technologies

Forrester_techRadarIoT

Internet of Things (IoT) security breaches have been dominating the headlines lately. WikiLeaks’s trove of CIA documents revealed that internet-connected televisions can be used to secretly record conversations. Trump’s advisor Kellyanne Conway believes that microwave ovens can spy on you—maybe she was referring to microwave cameras which indeed can be used for surveillance. And don’t delude yourself that you are immune to IoT attacks, with 96% of security professionals responding to a new survey expecting an increase in IoT breaches this year.
Even if you personally don’t suffer the consequences of the sub-par security of the IoT, your connected gadgets may well be unwittingly cooperating with criminals. Last October, Internet service provider Dyn came under an attack that disrupted access to popular websites. The cybercriminals who initiated the attack managed to commandeer a large number of internet-connected devices (mostly DVRs and cameras) to serve as their helpers. As a result, cybersecurity expert Bruce Schneier has called for government regulation of the IoT, concluding that both IoT manufacturers and their customers don’t care about the security of the 8.4 billion internet-connected devices in current use.

Whether because of government regulation or good old-fashioned self-interest, we can expect increased investment in IoT security technologies. In its recently-released TechRadar report for security and risk professionals, Forrester Research discusses the outlook for the 13 most relevant and important IoT security technologies, warning that “there is no single, magic security bullet that can easily fix all IoT security issues.”

Based on Forrester’s analysis, here’s my list of the 6 hottest technologies for IoT security:

    1. IoT network security: Protecting and securing the network connecting IoT devices to back-end systems on the internet. IoT network security is a bit more challenging than traditional network security because there is a wider range of communication protocols, standards, and device capabilities, all of which pose signi?cant issues and increased complexity. Key capabilities include traditional endpoint security features such as antivirus and antimalware as well as other features such as firewalls and intrusion prevention and detection systems. Sample vendors: Bayshore Networks, Cisco, Darktrace, and Senrio.
    2. IoT authentication: Providing the ability for users to authenticate an IoT device, including managing multiple users of a single device (such as a connected car), ranging from simple static password/pins to more robust authentication mechanisms such as two-factor authentication, digital certificates and biometrics. Unlike most enterprise networks where the authentication processes involve a human being entering a credential, many IoT authentication scenarios (such as embedded sensors) are machine-to-machine based without any human intervention. Sample vendors: Baimos Technologies, Covisint, Device Authority, Entrust Datacard, and Gemalto.
    3. IoT encryption: Encrypting data at rest and in transit between IoT edge devices and back-end systems using standard cryptographic algorithms, helping maintain data integrity and preventing data sniffing by hackers. The wide range of IoT devices and hardware profiles limits the ability to have standard encryption processes and protocols. Moreover, all IoT encryption must be accompanied by equivalent full encryption key lifecycle management processes, since poor key management will reduce overall security. Sample vendors: Cisco, Entrust Datacard, Gemalto, HPE, Lynx Software Technologies, and Symantec.
    4. IoT PKI: Providing complete X.509 digital certi?cate and cryptographic key and life-cycle capabilities, including public/private key generation, distribution, management, and revocation. The hardware specs for some IoT devices may limit or prevent their ability to utilize PKI. Digital certi?cates can be securely loaded onto IoT devices at the time of manufacture and then activated/enabled by third-party PKI software suites; the certi?cates could also be installed post-manufacture. Sample vendors: DigiCert, Entrust Datacard, Gemalto, HPE, Symantec, and WISeKey.
    5. IoT security analytics: Collecting, aggregating, monitoring, and normalizing data from IoT devices and providing actionable reporting and alerting on speci?c activities or when activities fall outside established policies. These solutions are starting to add sophisticated machine learning, arti?cial intelligence, and big data techniques to provide more predictive modeling and anomaly detection (and reduce the number of false positives), but these capabilities are still emerging. IoT security analytics will increasingly be required to detect IoT-speci?c attacks and intrusions that are not identi?ed by traditional network security solutions such as ?rewalls. Sample vendors: Cisco, Indegy, Kaspersky Lab, SAP, and Senrio. (See also my post regarding Aperio Systems.
    6. IoT API security: Providing the ability to authenticate and authorize data movement between IoT devices, back-end systems, and applications using documented REST-based APIs. API security will be essential for protecting the integrity of data transiting between edge devices and back-end systems to ensure that only authorized devices, developers, and apps are communicating with APIs as well as detecting potential threats and attacks against speci?c APIs. Sample vendors: Akana, Apigee/Google, Axway, CA Technologies, Mashery/TIBCO, MuleSoft, and WS02.

Note that Forrester did not identify any technologies in the “creation” stage. It says: “The continued evolution of IoT-specific security threats will undoubtedly drive innovation in this space, so expect more new IoT-specific security technologies to appear in the creation phase in the near future, many of which may align around vertical- and industry-specific use cases such as connected medical devices or industrial applications.”

Forrester lists the following challenges to achieving a secure IoT: Many IoT devices lack basic security requirements; There is a plethora of IoT standards and protocols, which creates security blind spots; The scale and scope of IoT deployments hinder visibility into security incidents; There is a lack of clarity of responsibility regarding privacy and security.

“The Dyn attack was likely just the start,” says Forrester, “so [we] can expect further attacks that leverage insecure IoT devices in the coming months and years.” Indeed, Gartner placed security at the top of its list of top 10 IoT technologies for 2017 and 2018, saying “IoT security will be complicated by the fact that many ‘things’ use simple processors and operating systems that may not support sophisticated security approaches.”

It’s complicated when simple things connect to become a vast network that reaches everywhere. Forrester makes the following observations and recommendations: IoT security requires an end-to-end approach; Encryption is an absolute must; IoT security scenarios place a premium on scalability (dealing with the sheer number of devices); Security analytics will play a significant role in IoT security solutions; IoT standards are important catalysts but still need time to mature.

Concludes Forrester: “It’s imperative for today’s digital businesses to balance the business benefits that IoT-connected products can deliver with the recognition that these same devices have become an attractive attack plane for hackers and cybercriminals seeking to cause disruption and exfiltrate sensitive data.”

Originally published on Forbes.com

Posted in Internet of Things | Tagged | Leave a comment

Marketing Technology Landscape, 2017

Scott Brinker:

  • There are now 5,381 solutions on the graphic, 39% more than last year
  • There are now 4,891 unique companies on the graphic, up 40% from last year
  • Only 4.7% of the solutions from 2016 were removed (and another 3.5% changed in some fundamental way — their name, their focus, or their ownership)
  • 6.9% are enterprises, with more than 1,000 employees or are public
  • 44.2% are private businesses, less than 1,000 employees or no funding data
  • 48.8% are investor-funded startups at any pre-exit stage

 

 

Posted in Misc | Tagged | Leave a comment

Robots Enjoy Strongest First Quarter on Record in U.S. and Canada

robot_sales_ria_may_2017

Robotic Industries Association:

North American robotics companies posted the strongest ever first-quarter results, according to the Robotic Industries Association (RIA), the industry’s trade group. Both robot orders and shipments achieved record levels.

An all-time high total of 9,773 robots valued at approximately $516 million were ordered from North American robotics companies during the first quarter of 2017. This represents growth of 32 percent in units over the same period in 2016, which held the previous record. Order revenue grew 28 percent over the first quarter of last year. Robot shipments also reached new heights, with 8,824 robots valued at $494 million shipped to North American customers in the opening quarter of the year. This represents growth of 24 percent in units and five percent in dollars over the same period in 2016.

Posted in Robotics | Leave a comment

Machine Learning Evolution

machine-learning-evolution-1.png

machine-learning-evolution-2.png

machine-learning-evolution-pwc

Posted in AI, Machine Learning | Tagged | Leave a comment

Mobile Tipping Point: 50.5% of American Homes have Only Wireless Phones

mobile_vs_phones

CDC:

The second 6 months of 2016 was the first time that a majority of American homes had only wireless telephones. Preliminary results from the July–December 2016 National Health Interview Survey (NHIS) indicate that 50.8% of American homes did not have a landline telephone but did have at least one wireless telephone (also known as cellular telephones, cell phones, or mobile phones)—an increase of 2.5 percentage points since the second 6 months of 2015. More than 70% of all adults aged 25-34 and of adults renting their homes were living in wireless-only households.
Posted in Misc | Tagged | Leave a comment

Digital Tipping Points: Bits Replacing Atoms

DigitalTippingPoint_Music

DigitalTippingPoint_Movies

 

Posted in digital transformation | Leave a comment

Internet Tipping Point: Laptops and desktops overtake TVs as preferred devices for watching TV shows

InternetTipping_TV_Video

Accenture:

Signaling an accelerating shift in the digital video market consumer behavior, the percentage of consumers who prefer watching TV shows on television sets plummeted by 55 percent over the past year, from 52 percent to 23 percent, according to findings from the Accenture 2017 Digital Consumer Survey.

The global online survey of 26,000 consumers in 26 countries* reveals that consumers increasingly prefer to watch TV shows on devices such as laptop and desktop personal computers and smartphones. More than four in 10 consumers (42 percent) said they would rather view TV shows on a laptop or desktop, up from 32 percent in last year’s survey. Thirteen percent said they prefer watching TV shows on their smartphones, compared with 10 percent last year.

The decline in TV viewing over the past year tracks with a four-year trend. As recently as 2014, the survey revealed that nearly two-thirds (65 percent) of consumers preferred the TV set for viewing TV shows.

The most-recent findings, summarized in a new Accenture report titled Winning Experiences in the New Video World, show that only one in five consumers (19 percent) now prefer to watch sports games on their TVs, down from 38 percent in the prior-year survey.

eMarketer:

The digital video audience is growing, and this year the number of digital video viewers worldwide will climb to 2.15 billion.

Digital video viewership growth will remain steady, in part due to the increased availability of content created in local languages. The option to download videos will also spur some growth, as consumers seek alternatives to poor mobile connection streaming while on the go. The top video sources worldwide consist of OTT services like Hulu, Netflix and Vimeo and social media platforms Facebook and YouTube. Among the top players in China, where 569.0 million digital video viewers reside, are internet platform Sohu and video hosting site YouKu Tudou.

 

Posted in Misc | Tagged , | Leave a comment