My latest opinion articles

Securing Society 5.0 Introduction

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap

A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all...
5G COVID-19

What COVID-19 Taught Us About the Need for 5G

There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common...
5G Virtualization

Unlocking the Future – Why Virtualization Is the Key to 5G

Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not yet commercially standardized, this technology has already been the most polarizing advancement we have ever seen in communication. Consumers worldwide are captivated by promises of super-fast...

My latest technology articles

Open RAN Security

Open RAN May Be the Future of 5G, but Can We Keep It Secure?

It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global 5G roll-outs being a notable result. Geopolitical conflicts have continued to muddy the market, with governments playing a more active...
5G TSN Manufacturing

5G in Manufacturing – 5G and Time Sensitive Networking (TSN) for Industrial Automation

In the recent report by IHS Markit - "The 5G Economy - How 5G will contribute to the global economy" - researchers claimed that manufacturing will garner almost $4.7 trillion in sales enablement by 2035. Or 36% of the $13.2 trillion total opportunity of 5G by 2035. Manufacturing will...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to...
5G SBA IMS MEC Architecture

Introduction to 5G Core Service-Based Architecture (SBA) Components

The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies. In addition to my usual articles about the societal impacts of these innovations, I'll start a series of articles introducing...
LoRaWAN IoT Security

LoRaWAN Security 101 (Non-5G IoT Connectivity Options)

I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high...
5G Critical Infrastructure

5G Critical Infrastructure – the Most Critical of All

Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under the bed’, the US government has declared there is one at the back door. It accuses Chinese technology companies of deliberately building vulnerabilities into their tech, allowing the Chinese to access and control the 5G critical infrastructure, and through it the connected devices and machinery at will. Headlines are dominated by the case against Huawei, and debate continues to rage about the legitimacy of the US’s claims. Are these well-founded or part of a more comprehensive assault on China’s growing global technology dominance? Regardless, the battle lines are...
Smart City Chip

Technology Trends for 2019 – More Amazing Than Flying Cars

Technologies that could change the world have been a popular topic for the past half...
5G 3GPP Release Timeline

Introduction to 3GPP and 3GPP 5G Releases 15, 16 and 17

In a major milestone for 5G, 3GPP finalized the Release 16 in July - its...
5G Health Concerns

5G Health Risks – Health, Wealth and Tin Foil Hats

The rollout of 5G is one of the most anticipated events in humanity’s technological history....
IoT Protocols Speed Range

IoT Wireless Protocols – Speed & Range – Comparison Chart

IoT Wireless Protocols data rate and range comparison in a chart.
Maritime Cyber-Kinetic

Defeating 21st Century Pirates: the Maritime Cyberattacks

The maritime industry faces a not-so-distant future when ships will be completely autonomous, using navigation...
AI and 5G

Digital Double Helix: Why the Fates of 5G and AI are Intertwined

In 2013, George F. Young and colleagues completed a fascinating study into the science behind...
Leadership AI Book

The Future of Leadership in the Age of AI – Preface

Today’s business leadership face a conundrum. Artificial Intelligence (AI) unquestionably will play an enormous role in the future of their organizations and the business environment in which they operate, but what effects will it have? Prognosticators have wildly different visions of the future it will create, ranging from causing the extinction of humanity to ushering in a Golden Age in which machines provide all humanity’s needs and free us to focus on altruistic service to one another and the advancement of human culture. Both of these most commonly heard predictions are based on assumptions that lead to wild speculation that piques the interest of media. Dramatic visions of the future draw eyeballs to websites and sell magazines and newspapers. What little analysis we have seen on the issue that doesn’t rush...
AI Three Futures

Three Views of Artificial Intelligence (AI) Future

If you’ve read the many predictions about the future of AI, you’ve likely found them...
AI and 5G Double-edged Sword

AI and 5G: AI at the 5G Core – A Double-Edged Sword

If you've ever been to an expensive restaurant and ordered a familiar dish like, say,...
AI Interpersonal

Those with Interpersonal Skills Have Least to Worry About the AI

Artificial Intelligence (AI) is becoming ever more important, and not just in automating repetitive, manual...
Risks of AI

Risks of AI – Meeting the Ghost in the Machine

In 1956, at a workshop on the campus of Dartmouth College, in Hanover, New Hampshire,...
AI Use Cases

AI Uses Today – Far More Than You Might Think

Ask people on the street how much AI uses today affect their lives, and most...
AI Cybersecurity Battlefield

AI: The Shifting Battlefield in the Cyber Arms Race

Cybersecurity strategies need to change in order to address the new issues that Machine Learning...
Society 5.0 and 5G

Will 5G and Society 5.0 Mark a New Era in Human...

In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human race. ‘Wicked problems,’ they suggest, are difficult to define, but they are essentially unsolvable in the usual scientific sense. The authors go on: wicked problems, such as climate change, are multi-dimensional, have multiple causes, multiple stakeholders, multiple symptoms and multiple solutions. They are by definition complex and difficult to process. Crucially, they are created or exacerbated by people. Our species has proved capable of producing challenges of unfathomable difficulty. We may, however, also prove capable of developing the novel thinking and technology required to overcome them. Society 5.0 is the vision of such a future, in which humans and machines “co-create” the solutions to societal problems by integrating cyberspace...
IIoT 5G Trust Security

IIoT and Trust and Convenience: A Potentially Deadly Combination

When microwave ovens first arrived on the market in 1967 they were met with public...
Cyber-Kinetic Security, IoT Security, OT Security

The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks

We live in a world in which the way we observe and control it is...
Canada Innovation Zones AI 5G

5G Innovation Zones in Canada for Launching AI and 5G in Tandem

In my previous post I argued that if Canada wants to succeed with its AI-focused...
5G Opportunity and Cybersecurity

Opportunity and Cybersecurity in the Age of 5G

The human will to innovate is seemingly relentless. The history of our species is one...
Tangible threat of cyber kinetic attacks

Tangible Threat of Cyber-Kinetic Attacks

Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed...
Smart City 5G Privacy

Cyber-Kinetic Security and Privacy Threats in Smart Cities

More than half of the world’s population lives in cities. The UN estimates that by...
Cyber-Kinetic Security, IoT Security, OT Security

The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks

We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities. Physical objects are so interconnected that we simply take those connections for granted, as if being able to unlock your car by pushing a button on your key fob, unlocking it with your phone or even by walking toward it is the way car locks always worked. This interconnectedness offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations....
IoT Cybersecurity Framework Government

5G Making It More Important for Governments to Lead IoT Security

The human brain is programmed to keep us safe and secure. Yes, we are separated...
Cybersecurity IoT 5G Cyber-Kinetic Risks

Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

Getting smart about security in smart systems Smart used to be something we called people or...
IIoT 5G Trust Security

IIoT and Trust and Convenience: A Potentially Deadly Combination

When microwave ovens first arrived on the market in 1967 they were met with public...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would...
Maritime Cybersecurity

Navigating a Safe Course Through Maritime Cyberattacks

The open seas have long attracted those who yearned for adventure. The risk of pitting...
Cyber-Kinetic Threat

Our Smart Future and the Threat of Cyber-Kinetic Attacks

A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems...
Blockchain Security

Blockchain Security

Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi) solutions. Blockchain is a set of technologies that through distributed computing and mathematics can now deliver Trust to an enterprise, consumer or financial institution remotely and without human intervention. Blockchain continues to improve at a torrid pace, driven first by Moore’s law and second by extraordinary advances in software and connectivity. As technology advances, the rapidly increasing number of use cases being developed on top of blockchain are illustrating the transformative potential of the technology to financial services, broader business, economy, and even society. Blockchain application in the financial services industry has the potential to transform the way value is transferred, information is shared and business logic...
Hong Kong Fintech

How Hong Kong’s FinTech sector is developing

The global financial services sector is accelerating its transformation in response to changing values and...
Blockchain Cybersecurity

Cybersecurity of Blockchain & Blockchain for Cybersecurity

You may have heard, over the last year or two, about the new technological miracle...
Blockchain Security

Blockchain Security

Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global...
Smart City Chip

Technology Trends for 2019 – More Amazing Than Flying Cars

Technologies that could change the world have been a popular topic for the past half...
Security Standards Regulations Guidelines

Emerging Tech Security Guidelines, Frameworks, Standards

Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security...
Diversity Uncomfortable

Diversity – The Benefits of Being Uncomfortable

The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing diversity often engenders frustration in those tasked with accomplishing it, and inspires eye rolls among diversity-fatigued employees who have heard countless reports on management’s diversity goals, but remain unconvinced of diversity’s value. Can anything be done to make diversity less of an uncomfortable topic? The answer is no. Nothing about diversity will ever make it into the general business population’s comfort zone. I say that not out of cynicism, but out of practicality. At its root, diversity is uncomfortable. But, surprisingly, the discomfort it creates is what makes it so valuable. Implicit biases, perceptions and reality A 2016 Harvard Business Review article that brought together some of the most advanced research...
AI Future Workforce

AI and The Great Workforce Skill Set Shift

Whether AI and the technologies it enables will reach their full potential depends on the...
AI Assimilators

Driving Change as Assimilators in the Age of AI

AI leaders must adapt to the changing culture as young workers enter the job market...
Diversity Failings

Can we Rescue Diversity from its own Failings?

Don’t expect this to be either of the typical articles about diversity. I’m here not...
AI Future

AI Is Neither the End of Civilization nor the Beginning of Nirvana

Where AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how...
Enterprise Resilience

Enterprise Resilience – A Model to Thrive in a World of Change

Modern theories of the firm remain focused on transaction costs, operational efficiency, employee motivation, leadership,...
Leadership in the age of AI

Leadership in the Age of Artificial Intelligence (AI)

AI’s effect on the workplace will not be limited merely to repetitive, production line-type jobs....
AI Fake News

AI-Exacerbated Disinformation and Cyber Threats to Democracy

Recent events have confirmed that the cyber realm can be used to disrupt democracies as surely as it can destabilize dictatorships. Weaponization of information and malicious dissemination through social media pushes citizens into polarized echo chambers and pull at the social fabric of a country. Present technologies enhanced by current and upcoming Artificial Intelligence (AI) capabilities, could greatly exacerbate disinformation and other cyber threats to democracy. Robert Kagan in his recent Post essay, “The strongmen strike back,” insightfully states: What we used to regard as the inevitable progress toward democracy, driven by economics and science, is being turned on its head. In non-liberal societies, economics and science are leading toward the perfection of dictatorship. Kagan refers to state surveillance and social media control and manipulation as technological mechanisms of social control....
5G Health Concerns

5G Health Risks – Health, Wealth and Tin Foil Hats

The rollout of 5G is one of the most anticipated events in humanity’s technological history....
Social Engineering

Social Engineering – Greatest Information Security Risk

Social engineering doesn't have to be just a supporting process to obtain system access; it...
AI Fake News

AI-Exacerbated Disinformation and Cyber Threats to Democracy

Recent events have confirmed that the cyber realm can be used to disrupt democracies as...
Zombification Cybersecurity Social Engineering

Human Zombification as an Information Security Threat

Human Zombification as an Information Security Threat – Differences in Information Security Concepts Between Euro-Atlantic...
FinCrime Cyber

Why Financial Crime and Cybersecurity Need to Team up

The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime. Yet businesses and even financial institutions tasked with protecting our money continue to fight this combined threat with multiple separate defense systems and multiple separate defense teams. The situation is like a military leader trying to fight different enemies on different fronts. While those enemies remain in different fronts, it makes sense to send separate defense forces against them, each focused on fighting only the enemy assigned to it. But what if those enemies merge and launch joint attacks? A smart military leader would merge his forces against the joint attacks. That’s not happening in financial institutions, though. Rather than having financial crime and cybercrime teams work...
FinCrim Fraud Terrorism

What are Financial Crimes? From Fraud to Terrorism

“Financial Crimes” is a term used to describe a variety of criminal acts including money...
Money Laundering

Combatting Money Laundering & Terrorist Financing

Terrorist funding detection has been practiced the same way as money laundering detection ever since...
AML CTF Value

Value of Anti-Money Laundering & Counter-Terrorism Financing

(Updated 2016) Anti–Money Laundering (AML) and Counter Terrorism Funding (CTF) are not the most popular subjects...
Societal-Cost-Money-Launderin

Societal Costs of Money Laundering

Money laundering is a crime that many people consider irrelevant to them. If a problem...
Sanctions Mojca Ivezic

Financial Institutions: Key in Fighting Weapons of Mass Destruction

How would you picture those who work to prevent weapons of mass destruction (WMD) from...
Money Laundering Layering

Fighting Money Laundering at the Layering Stage

One key to fighting money laundering is understanding its process and the vulnerabilities in each...
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government efforts to address this issue. Considering its success in developing research programs at its universities, its mediocre rankings overall in technology development is disappointing. Those programs alone have not been enough to translate into entrepreneurial innovation. A 2017 C.D. Howe Institute study points out that, even though Canadians have been at the forefront of breakthroughs in emerging technologies, in many cases, the chief beneficiaries of those breakthroughs have been other nations’ economies. Canada needs to take a stronger role in building an environment in which Canadian know-how spurs Canadian business growth. Causes for concern According to a 2017 PwC global survey, Canadian companies stand significantly ahead of their global counterparts in having a dedicated team for digital...
Canada 5G CA5G

Collaboration: The Unexpected Key to Success in Canada’s 5G

In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a...
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government...
Canada 5G AI

5G and AI – Getting Smart About 5G and AI in Canada

Canada has been investing in machine learning and artificial intelligence (AI) for longer than most...
Canada Innovation Zones AI 5G

5G Innovation Zones in Canada for Launching AI and 5G in Tandem

In my previous post I argued that if Canada wants to succeed with its AI-focused...
Canada Critical Infrastructure

Canadian Critical Infrastructure Cyber Protection

Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are...
smart cities privacy

Importance of Privacy for Smart Cities and IoT

From The Jetsons to Blade Runner, to Back to the Future, to A.I. to The 5th Element, popular culture has long been fascinated by what the future would look like for ordinary people. In these films and countless others, humans of the future are shown engaging with technology that speaks to them, cooks for them, asks them how their day was and connects them with the outside world in a seamless and intuitive way. These are all examples of what we now regard as smart homes and smart cities – living spaces optimized by devices connected through the Internet of Things (IoT), intelligently responding to our needs. These homes are a natural extension of the smart capabilities that most of us are already carrying around with us in our wearables...
Smart City 5G Privacy

Cyber-Kinetic Security and Privacy Threats in Smart Cities

More than half of the world’s population lives in cities. The UN estimates that by...
5G Opportunity and Cybersecurity

Opportunity and Cybersecurity in the Age of 5G

The human will to innovate is seemingly relentless. The history of our species is one...
Securing Society 5.0 Introduction

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap

A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that...
smart cities privacy

Importance of Privacy for Smart Cities and IoT

From The Jetsons to Blade Runner, to Back to the Future, to A.I. to The...
Smart Home Wireless Connectivity

Smart Home / Smart Building Connectivity Options and Their Cybersecurity

In a recent session on smart building cybersecurity, a student cheekily asked me "How did...
5G Security Privacy

5G Security & Privacy Challenges

Don’t let the “5G” in the title confuse you. This post is not only about...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to grant him access to a life of greater meaning and satisfaction. As technological evolution leads to concomitant advances in medical science, we are seeing more and more examples of humans who are integrating devices and sensors into their biological makeup. For some, like those part of the growing "transhumanist" movement, this is a means of artistic expression or exploration of human potential. For others, it is a solution to a medical problem. Either way, it represents the most vivid and personal...
Security Standards Regulations Guidelines

Emerging Tech Security Guidelines, Frameworks, Standards

Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security...
IoT Cybersecurity Framework Government

5G Making It More Important for Governments to Lead IoT Security

The human brain is programmed to keep us safe and secure. Yes, we are separated...
Cyber-Kinetic

When Hackers Threaten your Life – Cyber-Kinetic Attacks Intro

The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful...
Italian Earthquake Risk Management

Chilling Effects of Italian Earthquake Sentence on Risk Management

We have to ask ourselves; at what point does an unexpected outcome via expert prediction...
Cyber-Kinetic Security Railway

Growing Cyber-Kinetic Threats to Railway Systems

Cybersecuring railway systems from potential attackers must become paramount in the digitization that those systems...
Cyber-Kinetic Security, IoT Security, OT Security

The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks

We live in a world in which the way we observe and control it is...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all intercontinental data transfer that takes place every second of the day occurs via hundreds of thousands of miles of underwater cables. Reading a map of these submarine cables is like viewing a tapestry of international telecommunication. It is perhaps strange to think that the email you just sent to your colleague in Africa traveled below the Atlantic Ocean. It's an oddly analogue image in an online world. Yet, the digital capability that those cables unleash is increasingly the stuff of science...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a...
Canada 5G CA5G

Collaboration: The Unexpected Key to Success in Canada’s 5G

In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a...
5G Virtualization

Unlocking the Future – Why Virtualization Is the Key to 5G

Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its...
oran lexicon

The Open RAN Lexicon You Need

The telecoms and digital technologies sectors are notoriously jargonised. Eavesdrop on any conversation at an...
5G Business

Telcos Should Take Risks to Jumpstart the 5G Ecosystem

5G connectivity burst onto the world stage at last year’s Winter Olympics in Seoul, South...
5G SBA IMS MEC Architecture

Introduction to 5G Core Service-Based Architecture (SBA) Components

The interest in 5G and mIoT is exploding. It's exciting to see so many IT...
Copy link
Powered by Social Snap