Tech Insight: Zero Trust in a Trust-challenged World

Today, you can’t talk about security without mentioning zero trust. What is it and why is it such a prevalent principle and practice that dominates cybersecurity speak whether you are talking about an enterprise network, the emerging edge cloud or the 5G network? John Kindervag, SVP of Cybersecurity Strategy at ON2IT and creator of Zero Trust, joins neXt Curve to recalibrate our understanding of his brainchild and to discuss why it has become an important part of our cybersecurity vernacular.

Industry Insight: A Crisis in Trust & Privacy

For the foreseeable future, we will be challenged with the daunting task of updating our regulatory policies and measures to effectively keep individuals safe as digital technologies continuously create new avenues for dubious actors to impact our personal lives as well as our national security. In this episode, we discuss the myriad of issues that are contributing to a global crisis in trust & privacy that threaten to upend our societies, our economies and our individual rights.

Industry Insight: The Marriott Hack: A Call to Action for Holistic Security and Due Diligence for Mergers and Acquisitions

On November 30th, 2018, Marriott disclosed its Starwood acquisition had a 4-year-old data breach that exposed data for up to 500 million customers.  However, this wasn’t the first time they have been hacked. Corporate boards need to take cybersecurity and the risks of a digital future seriously.

Industry Insight: Holistic Security is Key to Meet the Digital Security Threats of Today & Tomorrow

On October 4th, 2018, Bloomberg’s Businessweek released a report alleging that Chinese spies implanted a “malicious chip” into server motherboards assembled by Super Micro Computer Inc. (Supermicro), a U.S.-based Original Device Manufacturer (ODM) that manufactures servers used in hyperscale data centers.  Growing national security threats are increasingly putting enterprises at risk as the bare-metal of… Continue reading Industry Insight: Holistic Security is Key to Meet the Digital Security Threats of Today & Tomorrow

The Digital Gap: Boardroom Leadership & Governance

Corporate boards of today are challenged with understanding the opportunities and the risks and threats presented by “Digital”.  As cybersecurity incidents and privacy issues from the Sony hack to the Facebook/Cambridge Analytica debacle increase in number and severity, board rooms cannot afford to not know.  neXt Curve hosted a discussion with USC Marshall School of Business professor, Bob Zukis on the urgency for digital savvy and competency in the board room.

The Democratization of 5G Everything

The original telco central offices of the past had legacy mainframe-like telephone switches with legacy voice features, which was ideal in the 1980’s and 1990’s but are archaic today. With VoIP over LTE in the cloud, these local offices can be re-architected into 5G nano-datacenters that provide very low latency fixed and mobile access and distributed edge computing that will enable new and innovative hyperconverged IT/CT applications and services that avail new business models and network monetization opportunities for operators.

Industry Insight: Apple Ushers in The Next Big Thing in Device Security & Privacy – eSIM

While eSIM’s have been used in the Samsung Gear 2 3G, Google Pixel 2, iPad Pro (Apple SIM) and the Series 3 Apple Watch, the iPhone has the potential to accelerate the broader eSIM adoption among carriers across the globe laying the foundation for the next big thing in Internet of Things (IoT) endpoint privacy and security.

Industry Insight: Another Intel Security Flaw? How This Foreshadows Delays for 5G.

On 8/14/2018, Intel revealed another security flaw has been exposed called “Foreshadow”, whereby a botnet could bypass the safeguards and create a “shadow copy” at an unprotected location of the computer’s CPU rendering Intel’s security measures inert.

Contextually-Aware Mobile Security as a Service: The Key to IoT Security and GDPR Compliance & Readiness with Blockchain

Mobile carriers with Managed Security Service Providers have the opportunity to address and solve some of the challenging cybersecurity issues threatening consumers and businesses alike, such as hardware-level vulnerabilities, encryption hacks, and inter-application data breaches, that are increasing the risk to privacy protection in the world of GDPR.