The raving discussions around 5G is a bold step in the right direction in my opinion and I support having first principle conversations on this subject matter. Just last year, the conversations around 5G were largely premised on the United States and China slugging it out on the commercial scene with behemothic corporations like Qualcomm and AT&T withdrawing technological support to Huawei at the behest of the United States government. The Chinese entity, ZTE before then had caved to the demands of the United States Department of Commerce and dumbed down its 5G ambitions to please the powers that be.Continue Reading Read More »
Reflecting on the happenings today in the Nigerian political sphere, I remember one of the best books I have read titled, “The Constraints of Corporate Tradition” written by Alan Kantrow in 1987. One of the mistakes leaders make is that they don’t understand the history of the organizations they work in and the portfolios they hold. The blind acceptance of tradition and the status quo by the political class narrows the scope of their vision and limits their understanding of the present contexts.
One of the many things future historians will find somewhat curious about the first half of the 21st century, is the most remarkable, maybe enthusiastic and self-assured way in which powerful professionals sought to restructure whole societies and economies around grand narratives — and the subsequent abject failure of each attempt at large-scale planning especially in the public sector by its leaders. These are weak signals of new high modernism.Read More »
The debacle between Huawei and major US vendors like Google, Intel, and Qualcomm with a behemothic underpinning from the US Government is premised on who is going to be the leader in 5G. Huawei greatly positioned itself in all relevant parts of the network – from access, via backhaul, through the core. If the first generation (1G) brought about mobility in technology, the second generation (2G) brought us into the digital world. The third-generation (3G) saw the introduction of mobile data, while the fourth generation (4G) created the mobile broadband that we use today.
Unlike previous generations which took us a single step forward arithmetically (though in scale, it was always a big one), the fifth generation (5G) takes us multiple steps in varying directions. When you think 5G, think about Artificial Intelligence & Robotics, think about the Internet of Things, and think about Virtual & Augmented Reality. 5G will enable this technological phenomenon to be deployed at the speed of light through applications like the Enhanced Mobile Broadband (eMBB) providing increased capacity for mobile subscribers at a peak rate of over 1Gbps per customer.Read More »
In the zest towards achieving wholesome digital transformation journeys, the modern security landscape is rapidly evolving. The emergence of apps, cloud services, big data, and mobile technology though quite revolutionary opens up newer vistas of risks as traditional network perimeters are fading away as businesses retrofit their organisations around these burgeoning technologies.
The most potent approach to defending against next-generation threats in the new age is by developing an integrated, enterprise-wide risk management strategy with clear governance and policies. The motive is to have resilient systems that will not only withstand cyber-attacks but will keep the MTPD (Minimum Tolerable Period of Disruption) at the barest minimum, and also carry out mission-critical business operations after an attack.Read More »
For a while now, we have been inundated with news of breaches across the entire spectrum – from the entreprise, to the public sector and it seems it wouldn’t abate anytime soon. The defacto reactionary measures put in place to mitigate polymorphic threats has failed immeasurably and it will be strategic to delve into other playbook(s) in our zest to finding holistic solutions to this malaise. Patterning the present threat landscape imbuing counterterrorism strategies will aid quick detection of anomalous behaviour.
Intrusion detection strategies have always focused on system vulnerabilities, and thereby ascertain immediate threats and not strategic patterns. When you take an introspective look at the current threat landscape, which in itself is quite fierce, it demands strategic-level insights of the all-encompassing threat which includes but isn’t limited to newer tactics, techniques, and procedures. When the Cyber Kill Chain was promulgated to serve as a yardstick for cyber-intrusion detection a while back, intrusions were quite mild as compared to now.Read More »