The increasingly instrumented and sensor-laden edge is making it difficult for people to find alone time and evade prying digital eyes. The challenge only promises to get bigger as consumer and industrial IoT continue to shed unwelcome light on our personal lives and our personal data. The issue of privacy is becoming a prominent topics of ethics and legality. What can you do as a member of the C-suite to steer your business with a privacy first compass?Continue reading
psyche. As individuals, as communities, as societies we need to understand the implications and the risks. Do we?Continue reading
For the foreseeable future, we will be challenged with the daunting task of updating our regulatory policies and measures to effectively keep individuals safe as digital technologies continuously create new avenues for dubious actors to impact our personal lives as well as our national security. In this episode, we discuss the myriad of issues that are contributing to a global crisis in trust & privacy that threaten to upend our societies, our economies and our individual rights.Continue reading
Some argue that the freemium business models that are largely based on ad-driven revenue streams have had a democratizing effect by allowing seemingly free access to content and services to be enjoyed broadly and globally. For the most part new digital media, software as a service (SaaS) and communications companies that have emerged from the Dotcom era have gone largely unchecked. What is the hope for privacy to be realized or restored in our digital now and future.Continue reading
We are in a race against fake and the ever expanding cyber attack surface that is the Internet of pretty much everything. With the advent of DeepFakes and other artificial challenges to reality and truth, the fundamental fabric that binds our societies, our economies and our business and personal relationships is fast fraying be becoming undone. Trust will become a valuable commodity as we seek to de-risk ourselves from contrived data, dubious transactions, and questionable parties. The emergence of trust platforms are inevitable and essential for restoring and sustaining the fabrics of trust that underpin our lives and make our civilization viable.Continue reading
neXt Curve attended the World Internet Conference 2018 in Wuzhen, China’s premier conference on the digital economy and policy, which took place from the 6th to the 9th of November. This year’s conference was sparsely attended by U.S. tech giants such as Apple and Google, but their absence didn’t put a damper on the global scope of the event and its continued promotion of the Digital Silk Road.Continue reading
On October 4th, 2018, Bloomberg’s Businessweek released a report alleging that Chinese spies implanted a “malicious chip” into server motherboards assembled by Super Micro Computer Inc. (Supermicro), a U.S.-based Original Device Manufacturer (ODM) that manufactures servers used in hyperscale data centers. Growing national security threats are increasingly putting enterprises at risk as the bare-metal of our digital infrastructure depends on a supply chain highly influenced and exposed to the Chinese government.
If Bloomberg’s allegations prove true, digital business leaders have yet another proof point that security matters and is vital to the ongoing integrity of their business in an increasingly digital economy. Considering that Supermicro is one of the largest manufacturers of servers by annual shipments and the largest ODM according to research firm, IDC, the scope of the “spy chip” vulnerability could be broad. But what do enterprises do now? The digital equipment supply chain will not change overnight.
Hardware-Level Security Vulnerabilities are Growing and Threatening the Foundation of Our Digital Economy
According to the Bloomberg report “The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies”, the malicious hardware implant (a.k.a. malicious chip) was detected by Amazon’s AWS engineers during their acquisition of the video compression firm Elemental Technologies, which leveraged Super Micro Computer’s servers for their on-premise platform offerings.
This malicious chip implant allegedly interrupts instructions to an affected server’s Baseboard Management Controller (BMC) whereby a rogue administrator could gain remote access to the server through a firmware update malware and potentially impact virtual and other physical servers sitting on a data center’s network.
What is concerning, if true, is these hardware vulnerabilities, including proven vulnerabilities like Meltdown, Spectre and Foreshadow could be leveraged to attack data centers by breaking traditional security boundaries and safeguards.
For instance, a hacker could use these hardware-level vulnerabilities to create a malware or hack method to log into a cloud service and potentially scan memory and processor cache to gain visibility to other users’ personal data, company intellectual property and/or acquire access to applications and virtual machines hosted on the same affected physical server. This type of threat exposes a business to a profound risk of personal and confidential data and content being compromised and stolen.
AI-based Behavioral Analytics – The Centerpiece of the Holistic Security Platform
If the Chinese “malicious chip” threat is considered in isolation it would seem – as represented in the Bloomberg report – there is no viable solution to the problem. As Bloomberg reporter, Jordan Robertson, stated in an interview with Emily Chang, “The Chinese government installed malicious microchips on Supermicro-assembled server motherboards. What a malicious microchip is, think about it as an infection that is hardcoded into your computer. You cannot get rid of it without throwing the machine away.”
However, the Bloomberg report intentionally or unintentionally hints and/or alleges that Amazon and Apple identified affected servers and monitored them for malicious activities (hack/breach incidents) prior to removing them from their data centers, suggesting the use of holistic security methods to identify and contain a threat that exploits the “malicious chip” vulnerability. Spot on!
Going forward businesses need to take a new, holistic approach to security. Traditional mindsets and approaches to enterprise security will be insufficient as rabid interest and investment in IoT and 5G by enterprises around the world expand the cyber-risk landscape. However, based on our own research at neXt Curve, we have observed significant gaps in security capabilities and frameworks needed to address future bare-metal-to-edge security threats in a rapidly converging and expanding ICT universe.
One of the key technologies needed to fill the many holistic security capability gaps is AI-based behavioral analytics. It is an emerging technology that is a critical element of a holistic security strategy and platform whereby standard (what is normal) profiles and behaviors of users and entities/resources (hosts, applications, and data repositories) and activities (network traffic and compute processes) are defined, and anomalous activity is analyzed, flagged, and quarantined or processes killed if needed.
While behavioral analytics may reside at the core of a holistic security solution framework, additional capabilities and services will need to be integrated in order to realize visibility and control over an enterprise’s internal and external digital infrastructure and environments. Additional solution components will range from cloud access security brokering, integrated endpoint and network service management, security information and event management (SIEM), to intelligent firewalls with DPI (deep packet inspection) for DLP: data loss prevention and content filtering.
Securing the network and software is not good enough anymore. Enterprises need to think of security from bare metal in the data center to the cloud to the endpoint devices that deliver the digital value we all love so much. It’s time to think differently about digital security.
Implications for Business Leaders
CISOs, CTOs and CIOs need to think of security holistically and consider new approaches to address an expanding field of profound hardware-level threats like Meltdown, Spectre and the tampering of hardware exemplified by the alleged Chinese “malicious chip” server sabotage. The management of risk will require ensuring that both internal and external resources and infrastructures are vetted whether they are enterprise-managed or managed by a 3rd party service provider.
The C-Suite and the board need to understand the significant risks that processor-level vulnerabilities will have on their business and on their digital strategy. It will be critical to bring cybersecurity competencies and a robust agenda into the boardroom to effectively manage and govern the expanding and deepening sea of digital threats facing enterprises today and into the foreseeable future.
Technology vendors have an opportunity to connect the dots and bridge existing and emerging technologies into a holistic security platform. This will require traditional vendors and service providers to venture outside of their silos and partner with holistic security ecosystem plays or lead by example with newer innovations.
The original telco central offices of the past had legacy mainframe-like telephone switches with legacy voice features, which was ideal in the 1980’s and 1990’s but are archaic today. With VoIP over LTE in the cloud, these local offices can be re-architected into 5G nano-datacenters that provide very low latency fixed and mobile access and distributed edge computing that will enable new and innovative hyperconverged IT/CT applications and services that avail new business models and network monetization opportunities for operators.Continue reading
neXt Curve attended the North American version of Mobile World Congress held in Los Angeles, California. This year, CTIA partnered with GSMA in hosting an event focused on the coming-together of the media and telecommunications industries into an important megatrend that promises to make MWCA (now Mobile World Congress Los Angeles) a special event among the Mobile World Congresses held around the world.Continue reading
While eSIM’s have been used in the Samsung Gear 2 3G, Google Pixel 2, iPad Pro (Apple SIM) and the Series 3 Apple Watch, the iPhone has the potential to accelerate the broader eSIM adoption among carriers across the globe laying the foundation for the next big thing in Internet of Things (IoT) endpoint privacy and security.Continue reading