Can CXO’s Bank on the Promise of Blockchains?

Today’s CXO is often faced with making decisions before all the aspects of an emerging technology are known. Take for example Blockchain technologies, something that there is a lot of talk about, as well as perceived need, yet still shrouded in mystery. Add to that the intricacies of edge computing and CXOs start to tread in uncertain territories. The potential intersection of edge computing and blockchain deserves a much closer look before CXOs pull the trigger.

Continue reading

The US-China Tech War: Technology and Digital Economic Leadership at the Crossroads

Last week, the US Senate passed the USICA (The United States Innovation and Competition Act) which includes the CHIPS for America Act. Despite what the title of the USICA and its sub articles might suggest, the policy is largely a manifesto for dealing with a rising and highly competitive China with particular concern for the Western rival’s ambition to achieve semiconductor self-sufficiency and Huawei’s ascension as the leading 5G technology vendor. The Act presents several concrete policy measures to diminish China’s access to US semiconductor technologies and 52 billion USD in federal funding to build a more resilient semiconductor supply chain. But will these policies help the US achieve what the title of the USICA suggest; improve US semiconductor supply chain resiliency and competitiveness in 5G? Will it stop the technological advancement of China and its digital economy long enough for the West to tame it? 

Continue reading

Tech Insight: Zero Trust in a Trust-challenged World

Today, you can’t talk about security without mentioning zero trust. What is it and why is it such a prevalent principle and practice that dominates cybersecurity speak whether you are talking about an enterprise network, the emerging edge cloud or the 5G network? John Kindervag, SVP of Cybersecurity Strategy at ON2IT and creator of Zero Trust, joins neXt Curve to recalibrate our understanding of his brainchild and to discuss why it has become an important part of our cybersecurity vernacular.

Continue reading

Industry Insight: A Crisis in Trust & Privacy

For the foreseeable future, we will be challenged with the daunting task of updating our regulatory policies and measures to effectively keep individuals safe as digital technologies continuously create new avenues for dubious actors to impact our personal lives as well as our national security. In this episode, we discuss the myriad of issues that are contributing to a global crisis in trust & privacy that threaten to upend our societies, our economies and our individual rights.

Continue reading

Industry Insight: Data Privacy

Some argue that the freemium business models that are largely based on ad-driven revenue streams have had a democratizing effect by allowing seemingly free access to content and services to be enjoyed broadly and globally. For the most part new digital media, software as a service (SaaS) and communications companies that have emerged from the Dotcom era have gone largely unchecked. What is the hope for privacy to be realized or restored in our digital now and future.

Continue reading

Tech Insight: Trust Platforms & Solutions

We are in a race against fake and the ever expanding cyber attack surface that is the Internet of pretty much everything. With the advent of DeepFakes and other artificial challenges to reality and truth, the fundamental fabric that binds our societies, our economies and our business and personal relationships is fast fraying be becoming undone. Trust will become a valuable commodity as we seek to de-risk ourselves from contrived data, dubious transactions, and questionable parties. The emergence of trust platforms are inevitable and essential for restoring and sustaining the fabrics of trust that underpin our lives and make our civilization viable.

Continue reading

Integrated Tools for the Hybrid Operation of the Evolving 5G Infrastructure

The evolution of 5G infrastructure will not be homogenous. Operators will be deploying islands of 5G across a sea of 4G and 3G. They will be faced with the challenges of developing, deploying and managing services across hybrid infrastructures that will be comprised of a fragmented mix of the old and the new. In order to accelerate returns on 5G investments operators will need a common, integrated toolchain that allows service providers to scale operations and services across a mixed portfolio of technologies and operating environments.

Continue reading

Industry Insight: The Marriott Hack: A Call to Action for Holistic Security and Due Diligence for Mergers and Acquisitions

On November 30th, 2018, Marriott disclosed its Starwood acquisition had a 4-year-old data breach that exposed data for up to 500 million customers.  However, this wasn’t the first time they have been hacked. Corporate boards need to take cybersecurity and the risks of a digital future seriously.

Continue reading