Author: Tyson Macaulay

Tyson Macaulay Tyson Macaulay is vice president of global telecommunications strategy at McAfee. Macaulay has extensive achievements in the telecommunications space, most recently as security liaison officer for the past 8 years at Bell Canada. He also supports the development of engineering and security standards through the Professional Engineers of Ontario, the International Standards Organization (ISO), the Internet Engineering Task Force (IETF), and the newly formed oneM2M.

In the Internet of Things (IoT), there are probably two new sorts of threat agents: “Chaotic actors” – people who don’t want money, information, attribution or really have specific goals, they just want to watch it burn. “Regulators” – yes, we mean “government” and potentially self-regulating industry bodies (like medical “colleges” or bar (legal) associations), The […]

Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services.  In contrast to a “white network” I would assess […]

  My book on Risk and the Internet of Things (RIOT) is coming along well and a colleague CTO, Greg Brown, now part of the effort. As it turns out, there is a lot to write about and the book is taking longer than first planned. 2+ years and counting. 300 + manuscript pages and growing! […]

Multi-party authentication and data protection Multi-party authentication and data protection can be expressed simply as  “2 +N”, meaning that “more than 2” entities are involved in a shared cryptosystem.  Additionally, this multi-party system can be  “horizontal” and “cascading”[1] The crux of these multi-party systems is that each participate “recreates” the keys common to the crypto-system […]

Weak or expensive: the old cryptosystem and techniques don’t scale to the IoT There are basically two models for authentication of Internet relationships, one is weak (shared key) and one is expensive (public key), and neither will address the full range of identity and access requirements in the IoT. SSL (Secure Sockets Layer) and TLS […]