My latest articles

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap

Securing Society 5.0 Introduction
A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical...

Open RAN May Be the Future of 5G, but Can We Keep It Secure?

Open RAN Security
It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global 5G roll-outs being a...

5G in Manufacturing – 5G and Time Sensitive Networking (TSN) for Industrial Automation

5G TSN Manufacturing
In the recent report by IHS Markit - "The 5G Economy - How 5G will contribute to the global economy" - researchers claimed that manufacturing will garner almost $4.7 trillion in sales enablement...

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

5G Cybersecurity Safety
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that...

Introduction to 5G Core Service-Based Architecture (SBA) Components

5G SBA IMS MEC Architecture
The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies. In addition to my...

LoRaWAN Security 101 (Non-5G IoT Connectivity Options)

LoRaWAN IoT Security
I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of...

Smart Home / Smart Building Connectivity Options and Their Cybersecurity

Smart Home Wireless Connectivity
In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment I realized I might have been overdoing my 5G...

Introduction to 3GPP and 3GPP 5G Releases 15, 16 and 17

5G 3GPP Release Timeline
In a major milestone for 5G, 3GPP finalized the Release 16 in July - its second set of specifications for 5G New Radio (NR) technology. As a second article in my series of...

Does the positive review of Huawei UDG source code quality mean that Huawei 5G is secure and reliable?

Huawei ERNW 5G Source Code Analysis
No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is certainly the most scrutinized. But the recent UDG source code review is not an evidence of security. ERNW, an...

Will Telcos Lose the Edge Computing Battle as Well?

Edge Computing Fog
For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the...

What COVID-19 Taught Us About the Need for 5G

5G COVID-19
There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By...

Unlocking the Future – Why Virtualization Is the Key to 5G

5G Virtualization
Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not yet commercially standardized, this technology has already been the...

Will 5G and Society 5.0 Mark a New Era in Human Evolution?

Society 5.0 and 5G
In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human race. ‘Wicked problems,’ they suggest, are difficult to define,...

The Open RAN Lexicon You Need

oran lexicon
The telecoms and digital technologies sectors are notoriously jargonised. Eavesdrop on any conversation at an industry conference (remember those?) and you’d be treated to a parade of acronyms, initialisms and technical terms that...

Opportunity and Cybersecurity in the Age of 5G

5G Opportunity and Cybersecurity
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress. The first industrial revolution mechanized...

Marin Ivezic's Personal Blog

Marin Ivezic

For 30+ years I’ve been protecting lives, well-being, the environment, and enterprises by bringing together cybersecurity, cyber-physical systems security, operational resilience, and functional safety approaches.
[This is a personal blog. Any views or opinions are personal. See Terms.]

5G.Security

5G and mIoT Security
My other blog is dedicated to security, privacy, and geopolitics of 5G, 5G-connected infrastructure, and massive IoT (mIoT).
Visit it at https://5G.Security.

My books (published and in process)

The Future of Leadership in the Age of AI - Amazon Best Seller

Cyber-Kinetic Security Book

Securing Society 5.0

Trusted 5G Book

@InsecureThings Twitter

Load More...
5G Critical Infrastructure

5G Critical Infrastructure – the Most Critical of All

Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new...
Leadership AI Book

The Future of Leadership in the Age of AI – Preface

Today’s business leadership face a conundrum. Artificial Intelligence (AI) unquestionably will play an enormous role in the future of their organizations and the business...
Society 5.0 and 5G

Will 5G and Society 5.0 Mark a New Era in Human...

In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human...
Cyber-Kinetic Security, IoT Security, OT Security

The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks

We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through...
Blockchain Security

Blockchain Security

Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi)...
Diversity Uncomfortable

Diversity – The Benefits of Being Uncomfortable

The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing...
AI Fake News

AI-Exacerbated Disinformation and Cyber Threats to Democracy

Recent events have confirmed that the cyber realm can be used to disrupt democracies as surely as it can destabilize dictatorships. Weaponization of information...
FinCrime Cyber

Why Financial Crime and Cybersecurity Need to Team up

The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime....
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government efforts to address this issue. Considering its success in...
smart cities privacy

Importance of Privacy for Smart Cities and IoT

From The Jetsons to Blade Runner, to Back to the Future, to A.I. to The 5th Element, popular culture has long been fascinated by...
Quantum Computer 5G Security

The Quantum Computing Threat to Cybersecurity and 5G

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as...
Marin Ivezic CISO
Copy link
Powered by Social Snap