Author: Tyson Macaulay

Tyson Macaulay Tyson Macaulay is the Vice President and Chief Technology Officer (CTO) for Global Telecommunications Strategy, part of the Office of the CTO at Intel Security. In this role, he is responsible for security solutions development supporting tier-1 carriers, service providers, and telecommunications equipment manufacturers.

Today Intel Security and Ericsson are working together to deliver managed security services (MSS) to the world. Why are we so excited to be working with Ericsson? We’re pleased to offer a combination of top-ranked network security products, telecom-grade service levels, speed to market and disruptively priced services with our new collaboration. With Ericsson, the […]

Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, they might not have information […]

Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly retard development; making the consequences of social engineering attacks in the IoT very significant. Social engineering attacks will certainly evolve into the Internet of Things (IoT), if they have not already. These attacks have the […]

In the Internet of Things (IoT), there are probably two new sorts of threat agents: “Chaotic actors” – people who don’t want money, information, attribution or really have specific goals, they just want to watch it burn. “Regulators” – yes, we mean “government” and potentially self-regulating industry bodies (like medical “colleges” or bar (legal) associations), The […]

Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services.  In contrast to a “white network” I would assess […]