{"251671":{"#nid":"251671","#data":{"type":"news","title":"Georgia Tech Warns of Threats to Cloud Data Storage, Mobile Devices  in Latest \u2018Emerging Cyber Threats\u2019 Report","body":[{"value":"\u003Cp\u003EAs more businesses find their way into the cloud, few engage in security measures beyond those provided by the associated cloud storage firm, a new report from Georgia Tech notes. Even fewer seek heightened data protection because of concerns that usability and access to remote data would be significantly reduced.\u003C\/p\u003E\u003Cp\u003EThese concerns are among findings made by the \u003Ca href=\u0022http:\/\/gtisc.gatech.edu\/\u0022\u003EGeorgia Tech Information Security Center\u003C\/a\u003E (GTISC) and the \u003Ca href=\u0022http:\/\/www.gtri.gatech.edu\/\u0022\u003EGeorgia Tech Research Institute\u003C\/a\u003E (GTRI) in today\u0027s release of the Georgia Tech Emerging Cyber Threats Report for 2014. The report was released at the annual \u003Ca href=\u0022http:\/\/gtsecuritysummit.com\/\u0022\u003EGeorgia Tech Cyber Security Summit\u003C\/a\u003E, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.\u003C\/p\u003E\u003Cp\u003E\u201cWith recent revelations of data collection by the federal government, we will continue to see a focus on cloud security,\u201d said Wenke Lee, director of GTISC. \u201cBut encryption in the cloud often impacts data accessibility and processing speed. So we are likely to see increased debate about the tradeoffs between security, functionality and efficiency.\u201d\u003C\/p\u003E\u003Cp\u003EEncryption challenges were a focus at this year\u2019s summit, which featured some of the nation\u2019s top information security experts. These included keynote speaker Martin Hellman, professor emeritus at Stanford University and one of the inventors of public key cryptography, a way of securing communications without relying on pre-shared secrets.\u003C\/p\u003E\u003Cp\u003EIn related findings, the report reveals security issues involving the \u201cInternet of Things,\u201d referring to the notion that the increase of Internet-capable devices could create opportunities remote hacking and data leakage. With everything from home automation to smartphones and other personal devices becoming connected to the Internet, these devices will capture more real-world information and could permit outside parties, companies, and governments to misuse that information.\u003C\/p\u003E\u003Cp\u003EIn the mobile space, even though designers of mobile devices and tablets have developed a robust ecosystem to prevent large-scale device compromises, the report finds that the threat of malicious and potentially targeted use remains. Earlier this year, researchers at Georgia Tech reported that they found ways to bypass the vetting process of Apple\u2019s App Store and subsequently showed how malicious USB chargers can be used to infect Apple iOS devices.\u003C\/p\u003E\u003Cp\u003E\u0022No matter how successful we have been, black hat operatives will continue to attack infrastructure at every angle possible, making cyber security a global issue for years to come,\u201d said Bo Rotoloni, director of GTRI\u2019s Cyber Technology and Information Security Laboratory (CTISL). \u201cWe must remain vigilant. The purpose of this Summit and Report is to raise awareness, create educational opportunities and maintain an ongoing dialogue among industry, academia and government.\u201d\u003C\/p\u003E\u003Cp\u003EThe Georgia Tech Cyber Security Summit is a forum for the IT security ecosystem to gather together, discuss and debate the evolving nature of cyber threats, and to chart the course for creating collaborative solutions.\u003C\/p\u003E\u003Cp\u003EIn addition to Hellman\u2019s keynote address, the 2013 Summit included a panel of security experts from Microsoft, Splunk, Dell Secureworks, Solera Networks and Georgia Tech.\u003C\/p\u003E\u003Cp\u003EThe Georgia Institute of Technology is one of the nation\u0027s leading public research universities and the home of cyber security research and education initiatives through GTISC, GTRI and other facilities across campus. These efforts focus on producing technology and innovations that help drive economic growth and improve daily life on a global scale.\u003C\/p\u003E\u003Cp\u003EThe report is available for download at \u003Ca href=\u0022http:\/\/www.gtsecuritysummit.com\u0022\u003Egtsecuritysummit.com\u003C\/a\u003E.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":"","uid":"27897","created_gmt":"2013-11-06 15:50:54","changed_gmt":"2016-10-08 03:15:18","author":"Phillip Taylor","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2013-11-06T00:00:00-05:00","iso_date":"2013-11-06T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"42941","name":"Art Research"}],"keywords":[],"core_research_areas":[{"id":"39501","name":"People and Technology"}],"news_room_topics":[{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EPhillip Taylor\u003Cbr \/\u003E404.894.7253\u003Cbr \/\u003E\u003Ca href=\u0022mailto:ptaylor@cc.gatech.edu\u0022\u003Eptaylor@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E","format":"limited_html"}],"email":["ptaylor@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}