Why all the 6G wireless talk before we even have 5G? TechRepublic's Karen Roby talks with ZDNet's Scott Fulton about the future of 6G, the current status of 5G, and breaks down the difference between the two. Read more: https://zd.net/2JBhSji "A fast internet connection is not some metropolitan luxury," wrote incoming UK Prime Minister Boris Johnson, in an op-ed for The Telegraph last June. "It is an indispensable tool of modern life. . . It is becoming the single giant ecosystem in which all economic activity takes place."It is, therefore, a disgrace that this country should suffer from a deep digital divide," Mr. Johnson continued, "so that many rural areas and towns are simply left behind." On Tuesday, July 2, Vodafone officially switched on its first 5G Wireless service in 15 metropolitan areas throughout the United Kingdom, including London, Liverpool, Glasgow, and Birmingham. In his Telegraph op-ed earlier this month, Vodafone CEO Nick Jeffery also invoked that curious, critical … [Read more...] about The 5G fallout: Brexit triggers a global wireless fault line
Global supply chain management degree
Malware in computers has been a reality since the 1990s, but lately the focus has shifted to hardware. So far, the semiconductor industry has been lucky because well-publicized threats were either limited or unproven. But sooner or later, luck runs out. Last year saw two significant incidents that shook people’s faith in the integrity of hardware security. The first was the Meltdown/Spectre flaws found in x86 and Arm processors, to varying degrees. Intel was hit the hardest because of its heavy use of speculative execution, Arm not so much, and different Arm SoCs had varying levels of exposure. Software fixes were issued, at the cost of performance. And with its recently-introduced Xeon Scalable processors, Intel has fixed the problem in silicon. The second was an October story by Bloomberg that motherboards sold by U.S. ODM Super Micro had tiny chips embedded in them to steal information. The motherboards were manufactured in Taiwan and China and allegedly used to steal … [Read more...] about Can The Hardware Supply Chain Remain Secure?
Chief information security officers (CISOs) today have replaced chief information officers (CIOs) as the most under-valued C-level executives. In fact, according to research from the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA), nearly one-third (29 percent) of corporations today still do not have a CISO role or its equivalent. And for those that do have such a role, the CISO is often relegated to “glorified administrator” status, rather than strategic business enabler. This is why CISOs are almost always fired or “resign” after major data breaches. When shareholders and customers demand blood following a breach, the CISO is the sacrificial lamb, even if there is no realistic way the CISO could have prevented the breach under the operating circumstances (which could include insufficient budget, headcount, and business visibility). This is often a self-defeating act, since the CISO is usually the most qualified person to … [Read more...] about CISOs: You need to manage by ‘walking around’
Video: The rise and rise of the CIOWhat is a CIO?A Chief Information Officer (CIO) is the most senior technology executive inside an organisation. The job title is used widely around the world in business and in government and in charitable and non-profit organisations.What is the role of the Chief Information Officer?The role of the CIO is to help to set and lead the technology strategy for an organisation, in concert with the other C-level executives. As such one of the many roles of the CIO it to provide an executive-level interface between the technology department and the rest of the business. What is the difference between a CIO and an IT director?IT directors tend to be focused on day-to-day operations, while CIOs are outward-facing and more concerned with strategy and leadership. Some IT directors, in fact, report to CIOs, especially those working for large, multi-national organisations at a country or regional level who sit beneath a global peer. Not all organisations will … [Read more...] about What is a CIO? Everything you need to know about the Chief Information Officer explained
There are more connected cars than ever — manufacturers are making more of them than ever, more people are driving them than ever, and that means hackers and bad actors have a bigger target than ever. As connected “devices” — albeit the biggest and most complicated of connected devices — vehicles are as vulnerable as any other internet-connected computer, smartphone, or anything else. Actually, they might be even more vulnerable; there have been numerous incidents in which hackers took direct control of IoT devices — and a vehicle‘s CAN bus is eminently hackable, according to experts. In addition, connected vehicles use more complex software to provide advanced functionality creating new opportunities for malware to take over. We just launched Plugged It’s our cool new gadget site. Take me 2018, it could be said, is the year connected car security finally got the attention it deserved. Being attacked by malware that steals user … [Read more...] about Where automotive cybersecurity is headed in 2019