Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 3 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

44CON – I am The Cavalry contemplate name change and encourage new members

by The Gurus
September 11, 2014
in Editor's News
Share on FacebookShare on Twitter

Research collective “I am The Cavalry” may be forced to change their name, due to misunderstanding about what its intention is.
 
Speaking at 44CON in London, member Beau Woods called the movement “A path forward for public safety”, but admitted that, more a year into its action, it was considering changing the name as it is “not recognised in Asia or Europe as we are not riding in on horses and firing pistols”.
 
Looking back at its first year, Woods said that most people are putting trust in technologies whether or not they are worthy of it. “We want to ensure trust through research, and want others who are better at research to join us, and we see outreach as a key part of that,” he said.
 
“We are moving into the manufacturing and policy arenas and helping them understand what security means. You are the target group we need as resources. We want to have a long term vision for cyber safety. It is one thing to fix a vulnerability, another to make sure doesn’t come up in the devices we use, and if they do come up we can deal with them so it is not an exposed piece of equipment for the rest of its life.”
 
Looking back at work done in its first year, Woods said that research has been done so the next piece is as effective so it can continue with what the group wants to do, know how to do it and connect folks together and connect the output of research to the people it affects.
 
Looking at the work done, Woods said that it went in with a public safety human life message, and recipients were keen, and “helped us be better than alone”. He said: “The idea is if no one else is coming to do this, then we have to stand up and save ourselves. When we talk to medical device manufacturers and ask why they do not add security, they have good reasons. They say that if they change too much and add security, they cannot sell the product for 6-9 years and that can cost lives.
 
“We tend to be down on people, and it can work. We have to reach out of echo chamber and have power and access to change things.”
 
He said that one thing it fears is not a “Cyber Pearl Harbor”, but an equivalent of the Cuyahoga River which infamously caught fire and subsequently set off the US environmental policy. “It is something that had to happen and had to have a reaction,” he said. “Make it happen sooner, then better. It is not I am the Cavalry. It is all of us.”
 
Next year, Woods said that the group needs to do better communication and have more transparency into what it is doing, and provide more information so researchers can figure out what it is doing and connect on their own and to each other to make good things happen.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Heartbleed impact was limited before revelation

Next Post

"Aware" Government encouraged to lead on IoT challenge

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information