PRO+ Premium Content/Information Security
Access your Pro+ Content below.
CISOs take notice as GPS vulnerabilities raise alarms
This article is part of the Information Security issue of December 2017, Vol. 19, No. 10
A collection of orbiting satellites used to triangulate location, the U.S. global positioning system is best known for its ability to locate things on or above the Earth's surface. Whether it's a mapping application, a truck fleet monitoring system or a family car, use of GPS services has become ubiquitous and indispensable. GPS also serves as the de facto world clock, transmitting accurate time everywhere. The precision timing powers and coordinates communication networks and electrical grids; GPS timestamps drive financial transactions determining, for example, which "buy" order was first. But GPS vulnerabilities and the growing reliance on this technology have raised security concerns. U.S. prosecutors charged three Chinese nationals in November with hacking and attempted theft of trade secrets from Moody's Analytics, Siemens AG and Trimble, which is developing a new global navigation satellite system. Mother Nature (solar flares) or bad actors with free online tools or inexpensive equipment can jam or alter local GPS ...
Features in this issue
-
John Germain lands the new CISO position at Duck Creek
Serving the technology needs of the property and casualty insurance industry means keeping a weathered eye on risk profiles, enterprise software and emerging threats.
-
CISOs take notice as GPS vulnerabilities raise alarms
GPS has been extraordinarily reliable, but there's a growing chorus of experts who say it's time to assess GPS security and consider protective strategies.
Columns in this issue
-
The tug of war between user behavior analysis and SIEM
Information security technologies embrace user behavior analytics, and the trend is expected to continue. Should CISOs consider a standalone UBA component?
-
What's with cybersecurity education? We ask Blaine Burnham
When he left the NSA, Burnham helped build the security education and research programs at the Georgia Institute of Technology and other universities. What did he learn?