By Talos Group This post was authored by Martin Zeiser with contributions by Joel Esler At Talos we are constantly on the lookout for threats to our customers networks, and part of the protection process is creating Snort rules for the latest vulnerabilities in order to detect any attacks. To improve your understanding of the rule development process, consider […]

Source:: Cisco Security Notice

By Paul Docherty Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR. We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access to their client database. For the uninitiated: […]

Source:: Cisco Security Notice

By Paul Docherty Have you ever wondered about how the everyday information available on your network could compromise your entire organisation? I lead the Cisco Security Advisory Services team in EMEAR. We recently performed a “Red Team” exercise in which our client set us the objective of attempting to gain access to their client database. For the uninitiated: […]

Source:: Cisco Security Notice

By Lindsay van Gemert See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect better and respond faster we […]

Source:: Cisco Security Notice

By Lindsay van Gemert See how our customers are enhancing their security posture with AMP for Endpoints At Cisco we know that security teams are a critical piece of what’s possible in any organization and simplifying their job is of utmost importance to us. We believe that by allowing customers to see more, protect better and respond faster we […]

Source:: Cisco Security Notice

By Talos Group Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A few weeks ago […]

Source:: Cisco Security Notice

By Talos Group Streams of malicious emails Talos inspects every day usually consist of active spamming campaigns for various ransomware families, phishing campaigns and the common malware family suspects such as banking Trojans and bots.. It is however often more interesting to analyze campaigns smaller in volume as they might contain more interesting malware. A few weeks ago […]

Source:: Cisco Security Notice

By Marc Blackmer Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of cancer […]

Source:: Cisco Security Notice

By Marc Blackmer Protect Vital Services in Advanced Medical Care, Automated Manufacturing, and Power Generation and Delivery From time to time, I find it’s helpful to pause and take stock of why I do what I do. Recently, I found myself talking with a CEO of a medical startup. Their goal was to improve the care of cancer […]

Source:: Cisco Security Notice

Hat schon jemand einen Roboter zu Hause?

Vermutlich, aber das beschränkt sich im Normalfall auf Staubsauger oder Rasenmäher. Diese kleinen Helfer sind nützlich, aber sie sind keine Roboter im hier gemeinten Sinne – auch wenn durch die eingebauten Sensoren Sicherheitslücken im eigenen zu Hause geboten werden. Wir sprechen heute über Roboter mit menschenähnlichem Aussehen und mit umfangreichen Sensoren und Kommunikationsmöglichkeiten. Jeder, der das entsprechende „Kleingeld“ hat, kann heute unterschiedliche Modelle kaufen und einsetzen.

Aber welche Einflüsse hat das auf unser Leben? Wie verhalten wir uns gegenüber Maschinen, die menschlich mit uns interagieren? Erstaunliche Forschungsergebnisse dazu präsentierte Brittany Postnikoff (University of Waterloo, Manitoba, Canada) auf der diesjährigen NGI-Konferenz im Rahmen der 10. Troopers in Heidelberg.

Roboter, die bei Stein, Schere, Papier mogeln, Roboter, die ein Hotel betreiben (Japan), Roboter, die im Restaurant kochen…die Entwicklung ist in vielen Bereichen des Kundenservice weit fortgeschritten und man begegnet den künstlichen Kollegen auch schon im medizinischen Bereich. Betroffen sind alle Bereiche, in denen Aufgaben zu wiederkehrender Routine gemacht werden können. Auch wenn ein Roboter heute noch ab 20.000 Dollar aufwärts kostet, ist das in der Welt der Robotik eher preiswert einzuordnen, denn der Roboter wird nicht krank, hat keinen Urlaub und arbeitet 24 Stunden am Tag, ganz zu schweigen von der präzisen Abarbeitung einmal angelernter Prozesse.

So verlockend das für Unternehmen klingen mag, birgt es auch Risiken. Die ausgesprochen sehenswerte Aufzeichnung des Vortrags von Brittany Postnikoff haben wir hier verlinkt (in englischer Sprache):