Oser Communications Group

CES19.Jan8

Issue link: http://osercommunicationsgroup.uberflip.com/i/1066244

Contents of this Issue

Navigation

Page 3 of 51

AN INDEPENDENT PUBLICATION NOT AFFILIATED WITH CES Kimberly Oser Publisher Jules Denton-Card Senior Associate Publisher Anthony Socci Associate Publisher Lorrie Baumann Editorial Director JoEllen Lowry • Jeanie Catron • Karrie Welborn Associate Editors Yasmine Brown Art Director Jonathan Schieffer Graphic Designer Caitlyn McGrath • Susan Stein Customer Service Managers Marcos Morhaim Senior Account Manager Adrian Chacon • Andy Hartnett • Beth Painter Louis Palos • Danny Ranney Account Managers Tara Neal Director of Operations Jay Watson • Hannah Stefanovich Show Logistics & Distribution Enrico Cecchi European Sales Consumer Electronics Daily News is published by Oser Communications Group ©2019 All rights reserved. Executive and editorial offices at: 1877 N. Kolb Road, Tucson, AZ 85715 520.721.1300/Fax: 520.721.6300 European offices located at Lungarno Benvenuto Cellini, 11, 50125 Florence, Italy www.osercommunicationsgroup.com Lee M. Oser Founder Consumer Electronics Daily News Tuesday, January 8, 2019 4 ASHA Continues to Promote Healthy Use of Popular Technology Recently, the American Speech- Language-Hearing Association (ASHA) launched the Healthy Communication & Popular Technology Initiative (www .communicationandtech.org), which encourages moderate use of popular technology. It focuses on providing prac- tical advice to individuals and families to develop responsible popular tech habits; conducting communication health aware- ness campaigns that promote balanced use of popular technology; and exploring the impact of popular technology usage on healthy speech, language and hearing. These efforts are not anti-technology nor are they the first time ASHA has been a national leader in the area of safe usage of popular technology. As far back as 2006, ASHA commis- sioned a large-scale national survey about the listening habits of teens and adults who used personal electronic devices that documented widespread misuse within both groups (ASHA, 2006). Media coverage was worldwide. For the next decade, ASHA encour- aged safe listening through its award- winning "Listen to Your Buds" cam- paign. Using a variety of tactics, includ- ing its safe listening concert series, which took place in elementary and middle schools across the country, the Buds campaign promoted simple preventative messages, such as keep the volume down, take listening breaks and model good listening habits. Throughout, ASHA received support from the Consumer Technology Association and others, and collaborated with groups like Security Concerns for Growing IoT Ecosystem By Bodil Josefsson, Head of IoT Security at Ericsson As an IoT network grows in size and complexity, so grows the attack surface and its vulnerability to advanced and per- sistent threats (APT). The number of connected devices is forecasted to reach 20 billion by 2023 (www.ericsson.com/en/mobility-report/ reports/november-2017). This is a grow- ing nightmare for both service providers trying to keep their networks secure, as well as for the enterprises collecting data from all the devices. Security must be a top priority for all stakeholders whose technology is a part of an IoT network. It must be taken into consideration from the start and cannot be an afterthought. This includes the service providers who need to maintain secure uptime to meet service level agreements as well as the device manu- facturers who'd like to avoid having their products mentioned in the next round of botnet headlines. Responsibility also lies with all parties in between, such as the organizations managing and gathering data from all the connect- ed devices. Here are the top four security concerns for our customers as they form end-to-end, IoT security strategies. How will I manage identity and access management? Humans are not the only entities subject to identity and access management (IAM) requirements. Devices and appli- cations that access network resources need to have the legitimacy of their con- nection requests verified as well as to what databases they want to connect. Continued on Page 49 Continued on Page 49

Articles in this issue

Links on this page

view archives of Oser Communications Group - CES19.Jan8