How big tech companies are looking to gain from quantum advances and their strategies for commercializing quantum computing
The different approaches they are using to develop their own quantum computers
How big tech giants are using partnerships to build out their quantum capabilities and stake out market positions
Which strengths and capabilities differentiate each big tech company in quantum
Farid Mheir's insight:
WHY IT MATTERS: quantum computing commercial applications is far in the future. But I found this paper from CBinsights useful as it highlights the many possible applications beyond cryptography.
12 technology trends that will help shape the future of digital business.
Farid Mheir's insight:
WHY IT MATTERS: this report from gartner review the top 12 buzzword you need to master for your geek xmas cocktail conversations ;-) As often with these, they are very generic and could end up being very difficult to implement. Nevertheless they point in the right direction, globally.
As remote work increases access management tool adoption, and security controls shift to identity, the ability to secure access with AM strategies aligned with continuous adaptive risk and trust assessment is paramount. Cost optimization for IT spending (e.g., AM) will also increase during 2021.
Farid Mheir's insight:
WHY IT MATTERS: as with most quadrants, the most interesting elements lie in the market definition and overview sections, not in the quadrant or ratings themselves. Notable in this quadrant is the fact that Amazon AWS, Salesforce and Google solutions have been excluded, as I assume they would be in top quadrant.
Interestingly, companies continue their move to SaaS solutions (no surprise) and focus on cost-reduction instead of customer satisfaction (weird, no?).
PayPal is an international payment system. PayPal is a global service that moves the payment amount from your credit card to the merchant without sharing your financial information. We sell the best and fully verified PayPal accounts that will help you in finding solutions to your current problems. This account is verified by credit card and Bank. Remember: card and bank verification takes time.
Girish Balakrishnan, Netflix's director of virtual production, says the workflow using Unreal offers "the ability to connect a DP in New York with VFX artists in London, a director in Los Angeles with an art department in Japan, and performance-capture talent with in-house animation supervisors." The goal is to streamline production across continents "while talent safely works from home."
Farid Mheir's insight:
WHY IT MATTERS: movie production is going digital real fast enabling distributed teams to work collaboratively. Will this mean that the production of hyper realistic fake videos will become easier to produce. One may think so :-(
We've reached the halfway mark of 2020, so it's a good time to take a look at the biggest data breaches of the year so far. And to clarify, when we say "big," we're talking about the importance of the story as much as the number of records exposed. Each of the data breaches on this list has something to teach businesses and consumers about how sensitive data is most likely to be exposed in 2020. (Credential stuffing is a major player, but don't count out the good old-fashioned human error!). Let's talk about 11 major breaches: what data was compromised, how it was exposed, and what we can learn from the story.
Farid Mheir's insight:
WHY IT MATTERS: every is working remotely and thus the potential for data breaches increases. This article highlights "how" the breach happened, which should provide good insights into the most common vulnerabilities...
Stay ahead of threats with the insights in the 2020 Data Breach Investigations Report (DBIR) from Verizon Enterprise Solutions. Read the official report now.
Farid Mheir's insight:
WHY IT MATTERS: the report is extensive and provides amazing insights into the most common security breaches. For example, the figure 22 shows that port 23 (telnet) and port 22 (SSH) remain most popular by far attack points. Many more insight in there...
Most cyber attacks and data breaches remain the result of weak passwords. So, why are we still using them?
Farid Mheir's insight:
WHY IT MATTERS: I've been writing about this since the beginning of this blog and 7 years later I feel the need to remind everyone to use a password generator at home and at work. This is even more important as remote work means we will connect remotely to many more systems in the future.
In 2018 I somewhat innocently bought very expensive coffee (Nespresso capsules) online from Ebay. What followed was a series of unexpected additional packages from the manufacturer Nespresso and a lurking suspicion that something had gone terribly--if not criminally--wrong as a result of my purchase. This talk chronicles the obnoxious amounts of obsessive research and tracking that became my new hobby--stalking Nespresso fraudsters and my decidedly non-technical attempts at developing a generic search profile and reporting the fraudsters to anyone who would listen, to include : the persons whose identities had been stolen, Nespresso, Ebay, and the FBI. Ultimately I just ended up with a LOT of coffee; a lingering sense that I had committed several crimes; and no faith left in humanity.
Farid Mheir's insight:
WHY IT MATTERS: a short and entertaining video on triangulation fraud in eCommerce websites. If you buy online listen to this. If you sell online, this is the kind of crap you have to deal with.
The growing cyber skills shortage drives security organizations to look for ways to mitigate the pain and danger that short-staffed security teams can experience. In its report, Security Organization Dynamics, Gartner outlines this ongoing challenge and notes how, “Persistent security skills shortages have forced security leaders to explore new ways of obtaining and managing security capabilities.”
Gartner points out that hiring may not be the only option for filling the gap, cautioning that, “Few, if any, enterprises can afford to perform all security functions in-house. Consider selective outsourcing of functions, especially those that are operationalized or ad hoc.”
Farid Mheir's insight:
WHY IT MATTERS: security, especially digital security and privacy, have become a central theme of digital transformation plans. Here Gartner surveys 300+ organizations to show different organizational structures for large, medium and small businesses.
My conclusion: there are too many people in charge of security, the governance is too complex and it is not clear who is RESPONSIBLE when a breach occurs...
Credential abuse and botnets abusing retailer inventories is a rising problem that needs attention. On average, organizations report experiencing 12.7 credential stuffing attempts each month, with each attempt targeting 1,252 accounts. We detected nearly 28 billion credential stuffing attempts between May and December 2018. Within the retail industry, the apparel vertical, experienced 3.7 billion attempts on its own, making it the largest targeted industry during the same timeframe. So why is retail, as well as apparel, such at hot target? Short answer? Money.
Farid Mheir's insight:
WHY IT MATTERS: I find the number just huge and thus a cause for concern in the design of my systems, strategies and recommendations to my clients. I also include the definition of credential stuffing because 1) I did not know and 2) it shines a light into the power of having a global CDN network to perform those analyses...
Credential abuse attempts were identified as unsuccessful login attempts for accounts using an email address as a username. In order to identify abuse attempts, as opposed to real users who can’t type, two different algorithms are used. The first is a simple volumetric rule that counts the number of login errors to a specific address. This differs from what a single organization might be able to detect because Akamai is correlating data across hundreds of organizations. The second algorithm uses data from our bot detection services to identify credential abuse from known botnets and tools. A well-configured botnet can avoid volumetric detection by spreading its traffic amongst many targets, by using a large number of systems in its scan, or spreading the traffic out over time, just to mention a few countermeasures.
Google is working on a new app for its Pixel smartphones that will use hardware sensors to detect an auto accident and automatically call emergency services if a person fails to respond.
Farid Mheir's insight:
WHY IT MATTERS: mobile phones are very personal devices that you carry with you all the time. I expect that solutions like this one, always listening in the background and reacting when a specific event occurs, will become the norm in the future. Already Alexa-siri-google are listening constantly, now solutions that merge the other sensors of the device - accelerometer, etc. - are natural extensions. They can be used for good as here - or for bad as with eavesdropping solutions that Edward Snowden made popular. I am surprised that few business applications have leveraged this already, for worker security in dangerous environment (fall detection, broken glass detection, earthquake detection, etc.) can all be included into business apps where the issues of privacy can be weighed against worker security and safety, especially for workers on the road or working in areas where they are alone (woods, etc.)
Driving safety is the focus of my personal research stemming from my job with the Postal Service. While I research accident theory and causation and ways to prevent, we do explore the possibilities of technology in case of a vehicle accident. We have technology in place in the scanners that mail carriers take with them to detect emergency situations. I personally worked with a supervisor that saved an employee's life due to his skilled use of that technology. This article provides information on another tool that can be beneficial to the safety of drivers in any company.
IoT has been and will be the talk of the town for many years to come. Learn the latest internet of things statistics, forecasts and facts for 2019.
The IoT is defined by everyday objects, interconnected via the internet in order to send and receive data. The reason why we connect these objects is simple: for convenience. To help you understand this technology better in 2019, we’ve created the following list of Internet of Things statistics.
Being able to arm your security system remotely, or start your washer, turn your lights on or off, or adjust the thermostat while being nowhere near them is a convenience our grandparents fantasized about. Looks like we will probably never have to worry about leaving the stove on again.
Farid Mheir's insight:
WHY IT MATTERS: with everything connected to the Internet, possibilities are endless, for good and bad...
Securitas 2018 investor update conference presents the strategy for the future.
Farid Mheir's insight:
WHY IT MATTERS: the security industry will be transformed with digital technologies, sensors, big data, drones, AI and other disruptive technologies. Start the video around 1:20:00 in the section #3
So why isn’t this system in widespread use? After all, much of it has been available since 2014. (Tehranipoor even described some in his 2017 article for IEEE Spectrum about the dangers of cloned chips.) “Sometimes a technology is ready, but it’s not used by companies because an attack hasn’t been seen to be real,” Tehranipoor says. This attack might be enough to change that perception, he says.
Farid Mheir's insight:
WHY IT MATTERS: as the article states, technology sometimes exists but most don'T feel this is an important issue - until it is too late or catastrophic event occurs. We can extrapolate this concern to pretty much everything regarding cybersecurity these days...
As the point of entry for 91% of cyber attacks, email is every organization’s biggest vulnerability. From malware to malware-less attacks including impersonation attacks like CEO fraud, a single malicious email can cause significant brand damage and financial losses. Understanding these ever evolving attacks and identifying the tactics used, is key to staying one step ahead of cyber criminals.
Farid Mheir's insight:
WHY IT MATTERS: this very good paper explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates. Be aware!
The annual report was compiled by mandiant consultants at FireEye based on hundreds of incident response investigations in many industry sectors. It offers recommendations on how organizations can improve the way they prevent, detect, analyze and respond to cyber attacks.
Farid Mheir's insight:
WHY IT MATTERS: this detailed report on cyber security trends shows an alarming statistic: it takes almost 100 days to detect an intrusion into computer systems. Why is that, given that data security and privacy are so important? Not enough resources? Lack of trained personnel? Hackers too good? Read to find out.
Facial recognition is the new hot tech topic in China. Banks, airports, hotels and even public toilets are all trying to verify people’s identities by analyzing their faces. But the police and security state have been the most enthusiastic about embracing this new technology.
Farid Mheir's insight:
WHY IT MATTERS: this article and video from the Washington Post provide a great over view of what China is doing with face and object recognition as part of its massive 500M cameras (2020 estimates). Nowhere to hide...
"Banks, airports, hotels and even public toilets are all trying to verify people’s identities by analyzing their faces." Another unnerving #bigdata trend to look out for in China.
In response to growing concerns about autonomous weapons, a coalition of AI researchers and advocacy organizations released a fictitious video on Monday that depicts a disturbing future in which lethal autonomous weapons have become cheap and ubiquitous. The video was launched in Geneva, where AI researcher Stuart Russell presented it at an event at the United Nations Convention on Conventional Weapons hosted by the Campaign to Stop Killer Robots. Russell, in an appearance at the end of the video, warns that the technology described in the film already exists and that the window to act is closing fast.
Farid Mheir's insight:
WHY IT MATTERS: there is often a downside to advanced technology, especially those that can allow its owner dominance. In this video scenario, humans weaponize drones with AI. But the real danger is for superintelligent AI to turn against us humans.
In an evermore connected world, large-scale cyberattacks and online threats to businesses are rising exponentially. The Cyber-Risk & Resilience special report, published in The Sunday Times, features insights into the impact cybercriminals can inflict on organisations and individuals. From chatbots spreading fake news, risks concerning personal data, biometrics and fraud, as well as tackling phishing emails, the potential dangers are unprecedented. Also included is an infographic on why hackers hack and an article on the top five ways quantum computing will change cybersecurity for good.
Farid Mheir's insight:
WHY IT MATTERS: the more we digitize our businesses and our lives the more we are exposed to hacking. The explosion of cryptocurrencies hacking and recent months appears to be a strong trend. A great series of articles on the subject is presented here.
Exclusive research by us at LDV Capital is the first publicly shared, in-depth analysis which estimates how many cameras will be in the world in 2022. Key Findings include:
Most of the pictures captured will never be seen by a human eye.
A paradigm shift will take place in the meaning and use of a camera.
Over the next five years there will be a proliferation of cameras integrated into products across industries and markets.
Where there is growth in cameras there will be tremendous business opportunities in the capture, analysis and interpretation of visual data.
Depth capture will double the number of cameras in handheld cameras.
By 2022, the number of cameras will be nearly 12X the 2012 figures.
Your smartphone will have between 4 and 10 cameras by 2022.
The Internet of Eyes will be larger than the Internet of Things.
In the next five years, robotics will have 20X more integrated cameras.
By 2022, all new vehicles will be equipped with more than 25 cameras and this does not include Lidar or Radar.
Farid Mheir's insight:
WHY IT MATTERS: cameras will become ubiquitous and AI systems will analyze those images to provide business services but also track our every move. This reports presents trends in this area.
A periodic table of cybersecurity to navigate the key players in the space, including startups, industry categories, investors, and exits.
Farid Mheir's insight:
WHY IT MATTERS: with digital transformation often comes increased level of digital threats. Good to keep in mind that there are tools to help reduce the risk of attacks or their impact when they happen.
With the Supreme Court slated to rule next term on whether cellphone location data requires a search warrant, a new poll shows that a majority of U.S. adults support law enforcement accessing certain personal data for someone under investigation, but only if it's authorized by a warrant. Polling was conducted June 8 through June 12 among 2,200 U.S. adults. Morning Consult is the official polling partner of POLITICO, Vox, Fortune, and Bloomberg News.
Farid Mheir's insight:
WHY THIS IS IMPORTANT
You have to trust companies and manufacturers with your private data to interact with them or use their products. What are people who distrust those companies doing? Not buying on Amazon? Not buying a smartphone? I guess not.
The short version: I'm loading over 1 billion breached accounts into HIBP. These are from 2 different "combo lists", collections of email addresses and passwords from all sorts of different locations. I've verified their accuracy (including my own record in one of them) and many hundreds of millions of the
Farid Mheir's insight:
WHY THIS IS IMPORTANT
Pretty much your whole life is online and digitize today. Your only protection from crooks is strong passwords that you never reuse. This article provides in depth discussion on the millions of passwords that are being sold for few dollars on the dark web. It should help you understand why this is important and what to do to be more secure.
The 2017 DBIR reveals what’s really happening in cyber security. This year’s report is based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches. That means you get a detailed insight into the cyber security threats you face.
Read the report and discover:
The biggest cyber security threats in your sector and what you can do to mitigate them.
Who’s behind the attacks and how they’re getting in.
What motivates the cybercriminals.
How nine incident patterns can help you predict what the cybercriminals will do next.
Farid Mheir's insight:
WHY THIS IS IMPORTANT
This annual report on cybersecurity from Verizon is one of the best as it analyzes data from 2,000 breaches to draw a portrait of cybersecurity threats that is factual. Must read.
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.
WHY IT MATTERS: quantum computing commercial applications is far in the future. But I found this paper from CBinsights useful as it highlights the many possible applications beyond cryptography.