Open RAN Security
It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic,...
5G Cybersecurity Safety
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind....
5G Opportunity and Cybersecurity
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in...
Quantum Computer 5G Security
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...
5G Connectivity Security
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine,...
Risks of AI
In 1956, at a workshop on the campus of Dartmouth College, in Hanover, New Hampshire, the field of artificial intelligence (AI) was born. Attendants...
5G Critical Infrastructure
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new...
US vs China 5G
Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can...
5G Network Slicing
Hyped as the technology that will transform the world, 5G is moving past the buzzword stage with first implementations coming to life in 2019....
5G Security Privacy
Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security...
Smart City 5G Privacy
More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than...
5G World Economy Society
Since the dawn of the 21st Century, the ways in which people and organizations that use the Internet experience, perceive and act in the...
Cybersecurity IoT 5G Cyber-Kinetic Risks
Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to...
IEMI
As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals,...
Canada Critical Infrastructure
Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are rapidly being connected to the internet, affording attackers opportunities...