0 comments on “Market Insights: The Marriott Hack: A Call to Action for Holistic Security and Due Diligence for Mergers and Acquisitions”

Market Insights: The Marriott Hack: A Call to Action for Holistic Security and Due Diligence for Mergers and Acquisitions

On November 30th, 2018, Marriott disclosed its Starwood acquisition had a 4-year-old data breach that exposed data for up to 500 million customers.  However, this wasn’t the first time they have been hacked. Corporate boards need to take cybersecurity and the risks of a digital future seriously.

0 comments on “The Digital Gap: Boardroom Leadership & Governance”

The Digital Gap: Boardroom Leadership & Governance

Corporate boards of today are challenged with understanding the opportunities and the risks and threats presented by "Digital".  As cybersecurity incidents and privacy issues from the Sony hack to the Facebook/Cambridge Analytica debacle increase in number and severity, board rooms cannot afford to not know.  neXt Curve hosted a discussion with USC Marshall School of Business professor, Bob Zukis on the urgency for digital savvy and competency in the board room.

0 comments on “Market Insights: Another Intel Security Flaw? How This Foreshadows Delays for 5G.”

Market Insights: Another Intel Security Flaw? How This Foreshadows Delays for 5G.

On 8/14/2018, Intel revealed another security flaw has been exposed called “Foreshadow”, whereby a botnet could bypass the safeguards and create a "shadow copy" at an unprotected location of the computer's CPU rendering Intel’s security measures inert. Currently this vulnerability…

7 comments on “Contextually-Aware Mobile Security as a Service: The Key to IoT Security and GDPR Compliance & Readiness with Blockchain”

Contextually-Aware Mobile Security as a Service: The Key to IoT Security and GDPR Compliance & Readiness with Blockchain

Mobile carriers with Managed Security Service Providers have the opportunity to address and solve some of the challenging cybersecurity issues threatening consumers and businesses alike, such as hardware-level vulnerabilities, encryption hacks, and inter-application data breaches, that are increasing the risk…