Rising IoT threat
The number of Internet of Things (IoT)-connected devices worldwide is predicted to more than double between 2019 and 2025. For the public, this may mean more access to the content and services that are a part of their daily lives; for companies, however, “job one” is and must always be to ensure their data and infrastructure aren’t breached.
IoT, for all the possibilities and opportunities it presents, also represents a potential ticking time bomb. Companies have never had more possible points of security exposure, which means bad actors have never had more possible “ins” to the precious data organizations are trying so hard to protect.
HP in the movie business
HP’s decision to become a film producer started with a basic idea: that companies are vulnerable not on the fringes but inside, at points where their printers are connected to their network.
It would have been easy for HP to produce a film with some wooden, wanna-be actors, with the whole thing taking on the look and feel of a restaurant employee training video from the eighties. But this is HP — innovator, risk taker, leader. They went big, bringing in Hollywood star Christian Slater, whose work in such films as True Romance and Broken Arrow has earned him the respect of peers and movie buffs alike.
Riveting panel discussion
Over the past few years, HP has produced a string of “Wolf” short films, with Slater playing an international corporate hacker extraordinaire. The latest installment (“Season 3”) is the topic of discussion for a panel of industry experts comprised of Quocirca Research Director Louella Fernandes, HP Senior Technologist for Print Howard Roberts, and HP Head of Security Practice Michael Howard.
The panel, moderated by independent security expert and blogger Graham Cluley, tackles six key questions concerning cyber-security in general and the third of HP’s “Wolf” short films in particular:
- Is Hollywood glamourizing cyber-security?
- Are faces the new fingerprints?
- How big a threat is the IoT?
- Is the public sector less secure?
- What’s the point of a firewall?
- Is BIOS protection a must?
The panel discussion, entitled “Beyond the Wolf,” provides much food for thought at a time when hackers have never been more resourceful or organized — and companies have never been more vulnerable to attack. Watch “HP Beyond the Wolf”
View season 3 of HP’s “Wolf” series: “The Wolf – True Alpha”
View season 2 of HP’s “Wolf” series: “The Wolf – The Hunt Continues”
View season 1 of HP’s “Wolf” series: “The Wolf – Nothing is Safe”