Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / Intel expert divulges security trends

Intel expert divulges security trends

December 9, 2019 by cbn Leave a Comment

Intel’s Amit Elazari Bar On discussed IoT security, ethical hackers, bug bounties, and more.

Combine an academic, a practitioner, a techie, and a lawyer, and you have Dr. Amit Elazari Bar On, director of global cybersecurity policy at Intel and lecturer at UC Berkeley’s School of Information, whose focus is cyberlaw, privacy and intellectual property. 

Before Intel, Elazari Bar On promoted Israeli patented photovoltaic technologies and served in an Israeli military elite intelligence unit. 

In short, she knows her cybersecurity and isn’t afraid to share.

SEE: Launching a career in cybersecurity: An insider’s guide (free PDF) (TechRepublic download)
 
In partnership with the UCLA Burkle Center for International Relations, Elazari recently held a live podcast to discuss her research in cybersecurity, patents, copyright, privacy and private ordering, and the evolving cybersecurity issues plaguing companies.
 
The focus was on how security is one of the most evolving and impactful landscapes in the regulatory sphere and the proposed initiatives in the areas of data protection, Internet of Things (IoT), Coordinated Vulnerability Disclosure (CVD), and more.

Following are highlights from Elazari’s talk:

The ethical hacker and bug bounties

Elazari discussed the emergence of the ethical hacker, someone who looks for vulnerabilities in cyber-systems and reports vulnerabilities to the corporation, so it can mitigate the vulnerability and issue a patch for a fix. 

She referenced the drone manufacturer’s DJI’s bug-bounty program , and explained, “This is basically a concept that is really developing among not just Silicon Valley companies, but the entire technology sector.

“This is the idea that companies can actually collaborate with external hackers, ethical hackers, friendly hackers, and security researchers,” who are not employed by the organization, “but out there testing the devices for potential security vulnerabilities or for potential issues that might leak information of users or whatnot.” 

The companies are “actually offering money bounties, yes, like in the wild, wild West,” Elazari continued.

The security community, she said, is into the concept of bug bounties and is becoming increasingly popular in Europe, with the Swedish and Dutch community.

Hacking, however, is not clean nor does it work according to a plan, she said. “It’s really about collaboration and increasing collaboration, and this is going to be more important as we think about all the regulatory initiatives and concepts that we have in the area of IoT security, an area which is definitely critical,” she said.  

In the DJI system case, an ethical hacker detected a vulnerability, she said. He reported it, but due to miscommunication and disagreements, “a legal threat letter was exchanged, mentioning one piece of legislation that you might have heard about, computer crime and fraud, the Computer Crime Fraud and Abuse Act,” she said.

The Computer Crime Fraud and Abuse Act (CFAA), Elazari said, is one of the main anti-hacking laws in the United States.
 
“It basically deals with the legality of activities like hacking an unauthorized access to computers and deals with issues of criminal and civil liability around hacking,” Elazari explained. “And those are issues that we still have some legal ambiguity around, academically speaking, here in the United States. It touches upon key issues like the legality of scraping information from the internet, and the relationship between employees and companies, and how employees potentially violate the company, [due to] computer-usage policies.”

Privacy, please

<a href="https://tr3.cbsistatic.com/hub/i/r/2019/12/06/b6d8f9a1-2b74-41e1-92f8-630d3791036e/resize/370x/d8ea1082cba1d397614ba71b6efc2f35/amit-headshot.jpg" target="_blank" data-component="modalEnlargeImage" data-headline="

Intel’s Amit Elazari 

” data-credit=”Image: Intel” rel=”noopener noreferrer nofollow”>amit-headshot.jpg

Intel’s Amit Elazari 

Image: Intel

Because of how interconnected everyone seems to be, “what we’re seeing with connectivity, [are] definitely proposed regulations of policies in the area of security and privacy,” Elazari said. She brought up the  California Consumer Privacy Act (CCPA) , which is the California privacy law that is coming to consumers in California starting January 2020. 

“This is just one example of the kind of issue that we’re seeing and regulatory landscape, the issue of equipping users with rights, about their data,” she said.

SEE: What Businesses Need to Know About the California Consumer Privacy Act (CCPA) (TechRepublic Premium) 

The focus on cybersecurity issues, she said, is less on the breach of confidentiality, but the misuse of how the information is handled.  

Control of personal data

“In the past, conversations [focused on the] kind of damages [that] arise, data harms,” she said. “Today, we are seeing regulators talking a lot about data rights,” basically regulatory concepts where, “individuals have in their data, the right to delete, and right to port their information. All of these concepts are expansions we’re seeing in the regulatory landscape, and we need to think about things like harmonization, as we address those issues.”
 
“Regulators,” she continued, “are becoming very technical and very tech savvy. So the Federal Trade Commission, the main consumer protection organization here in the United States, has done a lot of work in the area of security. And what’s interesting is that if you look at some of the settlements that they brought against companies…they have very detailed settlements. They have technical experts, they have a whole division of engineers working together with the lawyers, and they go into the weeds.”  

Passwords are still a security issue still, but in the future Elazari noted, “You will not have passwords anymore, and these are the kind of innovations that we’re working on.”

Global harmony

Technologies are international and continue to cross borders. “That’s why we have international standards on this,” she said. “It is why we need harmonization. The UK court of practice suggested that the vulnerability disclosure policy is one of the issues that they want to see in IoT security. So definitely, this is a global issue. We need to harmonize, and we need to think about the global nature of technology.”

Cybersecurity Insider Newsletter

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Sign up today

Also see

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in