While I add a similar disclaimer to all of my public content, it's particularly important in this case to emphasize that the convictions I've...
Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security guidelines, frameworks and standards. If you are aware of...
In their growing efforts to increase efficiencies through digitization and automation, railways are becoming increasingly vulnerable to cyber-kinetic attacks as they move away from...
Cybersecurity strategies need to change in order to address the new issues that Machine Learning (ML) and Artificial Intelligence (AI) bring into the equation. Although those issues have not yet reached crisis stage, signs are clear that they will need to be addressed – and soon – if cyberattackers are to be prevented from obtaining a decided advantage in the continuing arms race between hackers and those who keep organizations’ systems secure.
The 5G Core network is a Service Based Architecture. It evolves the traditional appliance based 4G Core Network to support services. It offers more...
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new...
In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human...
The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many,...
Today’s business leadership face a conundrum. Artificial Intelligence (AI) unquestionably will play an enormous role in the future of their organizations and the business...
Emerging Technology and Geopolitics of 5G
There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can...
The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn...