About the Author |
|
xiii | |
Preface |
|
xv | |
Acknowledgments |
|
xix | |
|
Chapter 1 From Packages to People |
|
|
1 | (16) |
|
The Consumerization of Security |
|
|
3 | (1) |
|
Early Clouds, Sunny Skies |
|
|
4 | (1) |
|
|
5 | (2) |
|
From Premobile to Mobile First |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (2) |
|
Dot-Com Redux in Physical Security |
|
|
11 | (1) |
|
Technology Adoption in Physical Security |
|
|
11 | (6) |
|
|
|
Chapter 2 The Run-Up to Cloud |
|
|
17 | (12) |
|
Cloud Meets an Industry of Late Adopters |
|
|
17 | (1) |
|
Skating to Where the Puck Has Been |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
Internet Protocol Blazes the Trail |
|
|
21 | (1) |
|
Before We Called It "Cloud" |
|
|
22 | (1) |
|
Five Essential Characteristics and Why They Matter |
|
|
22 | (3) |
|
Service Models: Applications vs Infrastructure |
|
|
25 | (1) |
|
Deployment Models: Public Clouds vs Private Clouds |
|
|
26 | (3) |
|
Chapter 3 The Tipping Point |
|
|
29 | (12) |
|
|
29 | (1) |
|
A Balanced View of Cyber Risks |
|
|
30 | (1) |
|
|
30 | (1) |
|
Are We More Conservative Than Our Customers? |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
Start-Ups Show Up to the Game |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
What Is My Cloud Strategy? |
|
|
37 | (4) |
|
|
|
|
41 | (8) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
|
Chapter 5 Security Ecosystems |
|
|
49 | (12) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
Middleware for the Real World |
|
|
54 | (2) |
|
|
56 | (2) |
|
|
58 | (1) |
|
Don't We Get Any Standards Out of This? |
|
|
58 | (3) |
|
Chapter 6 Altered Presence |
|
|
61 | (8) |
|
|
61 | (1) |
|
|
62 | (1) |
|
Known Knowns, Known Unknowns, and Unknown Unknowns |
|
|
63 | (2) |
|
Anthrometrics: Web Metrics IRL |
|
|
65 | (1) |
|
|
66 | (1) |
|
Breathing the Data Exhaust |
|
|
67 | (2) |
|
Chapter 7 What Can Mobile Do for Me? |
|
|
69 | (14) |
|
|
69 | (1) |
|
Real-Time Situational Awareness |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
Biometrics & Multifactor Authentication |
|
|
74 | (1) |
|
|
75 | (1) |
|
What's My Mobile Strategy? |
|
|
76 | (7) |
|
Section 3 The Internet of Things (IoT) |
|
|
|
Chapter 8 Why IoT Matters in Security |
|
|
83 | (14) |
|
Security: Already an IoT Business |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (1) |
|
Cheaper, Smaller, and More Discreet |
|
|
90 | (1) |
|
Big Wave or The Biggest Wave? |
|
|
91 | (1) |
|
IoT Will Become Part of Everything |
|
|
92 | (2) |
|
The Industrial Internet of Things |
|
|
94 | (3) |
|
Chapter 9 All Security Is Now Cybersecurity |
|
|
97 | (10) |
|
|
98 | (1) |
|
A Global, Residential, Commercial, and Even Universal Risk |
|
|
99 | (1) |
|
Cloud Security Redux... But Worse |
|
|
100 | (1) |
|
Device Authentication: Do I Know You? |
|
|
101 | (1) |
|
Orphans Without Governance |
|
|
102 | (1) |
|
|
103 | (2) |
|
|
105 | (2) |
|
Chapter 10 IoT Technology and Standards |
|
|
107 | (20) |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
115 | (2) |
|
The Standards Battlefield |
|
|
117 | (2) |
|
|
119 | (1) |
|
Standards Organizations and Consortia |
|
|
120 | (3) |
|
|
123 | (4) |
|
Chapter 11 The New Playing Field |
|
|
127 | (12) |
|
What's Old Is New---At Least for Startups |
|
|
128 | (2) |
|
Large Tech & Telecom Eye Physical Security---Again |
|
|
130 | (2) |
|
|
132 | (2) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
Coda: Is IoT Really a Category? |
|
|
135 | (4) |
|
Section 4 Data: Bigger, Smarter, Faster |
|
|
|
|
139 | (8) |
|
Can Big Data Save Your Life? |
|
|
140 | (1) |
|
Big Data Defined: The Four V's |
|
|
141 | (1) |
|
The Case of the Missing Data |
|
|
142 | (2) |
|
|
144 | (1) |
|
How Not to Think About Big Data |
|
|
145 | (2) |
|
|
147 | (14) |
|
|
147 | (1) |
|
|
148 | (2) |
|
From Variety to Video and Back |
|
|
150 | (2) |
|
Big Security Data and ROI |
|
|
152 | (1) |
|
Methods to Cut Through the Madness |
|
|
153 | (8) |
|
|
161 | (12) |
|
|
162 | (2) |
|
Lessons From Cyber Security |
|
|
164 | (2) |
|
|
166 | (2) |
|
|
168 | (2) |
|
|
170 | (3) |
|
Chapter 15 Data-Driven Security |
|
|
173 | (10) |
|
The Emergence of Data Analytics in Security |
|
|
174 | (1) |
|
|
175 | (1) |
|
Big Data, Now Arriving in the Cloud |
|
|
175 | (1) |
|
|
176 | (1) |
|
The Lack of Standards for Security Events |
|
|
177 | (1) |
|
Adoption, Transformation, and Strategy |
|
|
178 | (5) |
|
Section 5 Social + Identity |
|
|
|
|
183 | (8) |
|
|
184 | (1) |
|
|
185 | (1) |
|
The Holy Grail of Universal Identity |
|
|
186 | (2) |
|
Identity Is the New Perimeter |
|
|
188 | (3) |
|
Chapter 17 Social Saves Lives |
|
|
191 | (6) |
|
Virtual Social Media Working Group |
|
|
192 | (1) |
|
|
192 | (1) |
|
Social Media for Emergency Management (#SMEM) |
|
|
193 | (1) |
|
|
193 | (2) |
|
Not Your Kid's Social Media |
|
|
195 | (2) |
|
Chapter 18 On the Internet, No One Knows You're a Dog |
|
|
197 | (6) |
|
|
198 | (1) |
|
What Is an Identity Standard? |
|
|
199 | (1) |
|
Authentication vs Authorization |
|
|
199 | (1) |
|
|
200 | (3) |
|
|
203 | (10) |
|
What Does it Mean to be a Social Space? |
|
|
204 | (2) |
|
|
206 | (1) |
|
Communication and Crowdsourcing |
|
|
206 | (1) |
|
Security as a Customer Experience |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (4) |
|
|
|
Chapter 20 The Secrets of the Universe |
|
|
213 | (8) |
|
|
214 | (4) |
|
|
218 | (1) |
|
A New Mission for Security |
|
|
219 | (1) |
|
What Goes Around Comes Around |
|
|
219 | (2) |
Index |
|
221 | |