Information security must deal with evolving threats—a cat-and-mouse game where every new attack is countered by advances in cyber-security, which in turn are sidestepped by redesigned malware tactics. As applications, devices and networks continuously redefine the character of cyberspace, the Georgia Tech Information Security Center re-evaluates threats and recommended responses each year at its annual Security Summit on the Evolving Nature of Cyber Security Threats. Look for cyber security to evolve along with the threats for the foreseeable future. RColinJohnson, Kyoto Prize Fellow @ NextGenLog
Futurist and R&D pioneer Joel Birnbaum predicted the evolution of pervasive computing.
Here is what Smarter Technologies says about cyber security: The Georgia Tech Information Security Center (GTISC) Security Summit debuted the Emerging Cyber Threats Report for 2011, which summarizes the cyber-threat landscape for next year, evaluates the most urgent needs and recommends IT responses to counter the threats. This year, the Cyber Threats Report described three emerging threats for which security experts should prepare: coordinated botnet attacks, social networking breeches and infrastructure penetration that could cause physical damage. Full Text: http://bit.ly/NextGenLog-dA1d
Next-generation electronics and technology news stories published non-stop for 20+ years, R. Colin Johnson's unique perspective has prompted coverage of his articles in a diverse range of major media outlets--from the ultra-liberal National Public Radio (NPR) to the ultra-conservative Rush Limbaugh Show.