My latest articles

Huawei ERNW 5G Source Code Analysis

Does the positive review of Huawei UDG source code quality mean that Huawei 5G is secure and reliable?

No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is certainly the most scrutinized. But the recent UDG source code review is not an evidence of security. ERNW, an independent IT security service provider in Germany, recently performed a technical review / audit of Huawei’s...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all...
5G COVID-19

What COVID-19 Taught Us About the Need for 5G

There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common...
5G Virtualization

Unlocking the Future – Why Virtualization Is the Key to 5G

Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not yet commercially standardized, this technology has already been the most polarizing advancement we have ever seen in communication. Consumers worldwide are captivated by promises of super-fast...
Society 5.0 and 5G

Will 5G and Society 5.0 Mark a New Era in Human Evolution?

In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human race. ‘Wicked problems,’ they suggest, are difficult to define, but they are essentially unsolvable in the usual scientific sense. The authors go on: wicked problems, such...

Latest industry news

S.3469 NETWORK Act

U.S. lawmakers introduce bill targeting Huawei for industrial espionage

A bipartisan group of U.S. lawmakers today introduced in Senate a bill aimed "To impose sanctions with respect to foreign telecommunications companies engaged in...
Bell Canada 5G

Bell Canada to pause 5G launch due to COVID-19

On Bell's BCE Inc (BCE) Q1 2020 Results Conference Call on Thursday new Bell's President and CEO Mirko Bibic said: "We are ready with...
TeraGo 5G

TeraGo commences 5G fixed wireless technical trials in Toronto

TeraGo Inc. (“TeraGo” or the “Company”) (TSX: TGO, www.terago.ca) is a Canadian managed cloud and connectivity solutions company. It owns a national spectrum portfolio...
The Next Gen Future 5G Australia

Report: Inquiry into the deployment, adoption and application of 5G in AU

Australian government's committee - The House of Representatives Standing Committee on Communications and the Arts - has issued a new report on adoption of...

3GPP delays releases 16 and 17 for three months

In response to COVID-19 3GPP has delayed the next two 5G standards releases - releases 16 and 17 - by three months. 3GPP Release 16...
UK 5G Huawei

Huawei Greenlit for U.K.’s 5G Network

The U.K. government greenlit Huawei for a limited role in the U.K.'s fifth-generation telecommunications networks. This is a blow for American efforts of the...
Rogers 5G Vancouver

Rogers begins 5G rollout in Vancouver, Toronto, Ottawa and Montreal

Rogers announced it is starting to roll out Canada’s first 5G network in downtown Vancouver, Toronto, Ottawa and Montreal so it is ready when...
5G Threat Landscape

ENISA published “Threat Landscape of 5G Networks”

ENISA, the EU's always excellent cybersecurity watchdog, published "Threat Landscape of 5G Networks", a report on threats relating to 5G networks. The report presents...
Huawei Position Paper Cybersecurity 5G

Huawei releases its position paper on cyber security

Today Huawei released its position paper on cyber security. The paper is an excellent summary of 5G security risks, latest standards and industry developments...
Accelerating 5G in Canada Report

5G Will Have Significant Positive Impacts for Canadians

Cities and rural communities across Canada will see significant economic and quality-of-life benefits as 5G is deployed. According to a new report commissioned by the...
Canada Huawei 5G

Canadian Intelligence Agencies Disagree on Huawei Ban – Media

According to a recent media report, Canadian key intelligence agencies - the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) -...
UBC Rogers 5G

Rogers Opens First 5G-Powered Smart Campus at UBC

Rogers Communications, together with the University of British Columbia (UBC), announced the launch of what it claims to be Canada’s first 5G-powered smart campus...
Ericsson Concordia 5G

Ericsson Extends 5G Security Partnership with Concordia University

Ericsson has extended a 5G security partnership with Concordia University in Montreal, Canada, through a new industrial research chair awarded by the Natural Sciences...
Encqor Canada 5G

ENCQOR 5G Launches First Public mmWave Service in Canada

ENCQOR 5G (Evolution of Networked Services through a Corridor in Québec and Ontario for Research and Innovation) industry partnership announced that Canada's first publicly...
GSMA North America 5G

GSMA Report Highlights North America’s Global 5G Leadership

A new GSMA report highlights North America's global 5G leadership. The report - The Mobile EconomyNorth America 2019 - part of GSMA’s ongoing Mobile...

About me

Marin Ivezic

Marin Ivezic is a Cybersecurity & Privacy Partner in PwC Canada focused on risks of emerging technologies. He leads PwC’s global 5G cybersecurity efforts as well as industrial, IoT and critical infrastructure cybersecurity services in the region. All these focus areas are being transformed with the emergence of 5G, massive IoT (mIoT) and critical IoT (cIoT).
[This is a personal blog with guest contributors. All information is provided on an as-is basis. Any views or opinions represented here are personal and belong solely to the author and do not represent those of people, institutions or organizations that the author may or may not be associated with in professional or personal capacity. See Terms of Use.]

Most popular articles this week

My books

5G World Economy Society

How 5G Will Transform Economy and Society

Since the dawn of the 21st Century, the ways in which people and organizations that use the Internet experience, perceive and act in the world is radically changing. We interact with physical objects and systems well beyond our sight and comprehension. Our cars, homes, factories and public transportation are controlled increasingly by computer chips and sensors. This interconnectedness already exceeds much of last century’s science fiction imaginings, but is poised to accelerate even more dramatically with the advent of 5G. Popular telecom carrier driven expectations about the speed and capacity of 5G consumer mobile...
5G Connectivity Security

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in the early part of the 21st century, we stand witness to the birth of a new industrial revolution built on 5th generation cellular technology - 5G network. As the name implies, 5G network follows a developmental chain. First came 1G, the first generation of cellular communication that freed us to make voice calls without being tethered...
US vs China 5G

Geopolitics of 5G and 5G-Connected Massive & Critical IoT

Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can be licensed by burgeoning markets for revenue. A first-mover advantage is often a way to lock in relationships that can lead to long-term infrastructure commitments, integration support services, and service delivery platform development. As the adage goes, “Whoever owns the platform, owns the customer.” This race to be the first to establish technological platforms and lock-in their customers is increasingly becoming politicized. And 5G, the next generation of cellular...
Cybersecurity IoT 5G Cyber-Kinetic Risks

Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to describe one's hairbrush. That is changing, of course, in an era of accelerating digital transformation. Now we have smart homes, smart cities, smart grids, smart refrigerators and, yes, even smart hairbrushes. What's not so smart, though, is the way the cybersecurity and cyber-kinetic security risks of these systems are often overlooked, and with new horizon technologies like 5G, these problems are set to grow exponentially.
Smart City 5G Privacy

Cyber-Kinetic Security and Privacy Threats in Smart Cities

More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure that human needs are met in a fair and equitable way? How will we face challenges like resource strain, waste and pollution management, traffic congestion and connectivity? In response to these wicked problems, cities are increasingly relying on smart technologies to foster greater efficiency and sustainable growth. These interventions do not, however,...
AI Three Futures

Three Views of Artificial Intelligence (AI) Future

If you’ve read the many predictions about the future of AI, you’ve likely found them to be wildly different. They range from AI spelling doom for humanity, to AI ushering in Golden Age of peace, harmony and culture, to AI producing barely a blip on society’s path toward ever-greater technological achievement. Those three views – dystopian, utopian and organic – present issues we need to consider as we move deeper toward an AI-integrated future. Yet they also contain exaggerations and false assumptions that we need to separate from reality. The Dystopian...
Canada 5G CA5G

Collaboration: The Unexpected Key to Success in Canada’s 5G

In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a hundred years of evolutionary theory. It proposed that millions of years ago, the eukaryotes emerged not from competition, as neo-Darwinism asserts, but from collaboration. Margulis’ research showed how single-celled lifeforms working together created an entirely new organism that became the foundation of all advanced life on earth. This was an inflection point in the development of evolutionary biology, shifting the scientific and cultural narrative away from “survival of the fittest” towards “survival of the most cooperative.” Though competition contributes to better individual or organizational performance, it...
Quantum Computer 5G Security

The Quantum Computing Threat to 5G Security

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would be practically impossible for a classical machine. This quantum computing breakthrough brings us closer to the arrival of functional quantum systems which will have a profound effect on today's security infrastructure. How will quantum computing affect the security of 5G technologies currently being developed and deployed? Last spring we suggested that the emergence of quantum internet connectivity and computation, expected sometime in the next decade, poses numerous new cryptography and cybersecurity challenges for 5G security. MIT offers...

Resources

@5GSec Twitter

Security Researchers Attacked Google’s Mysterious Fuchsia OS: Here’s What They Found - "We are able to gain kernel code execution from a regular userland process." https://5gs.ec/2DfVviv

Enterprise Resilience – A Model to Thrive in a World of Change - Marin Ivezic - One factor that enables our company’s long-term viability is Enterprise Resilience which enables a company to adapt to a change. https://5gs.ec/2LzKQ2V

When Hackers Threaten your Life – #CyberKinetic Attacks Intro - http://5G.Security Marin Ivezic - As we move into an era of hyper-connectivity founded on #5G and facilitated by the #IoT, the risks to #cyber-physical systems will only increase... https://5gs.ec/3fLomcP

NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems - Alert (AA20-205A) urges all DoD, DiB and U.S. critical infrastructure facilities to take immediate action to secure their #OT. https://5gs.ec/39Tc3cb

Lazarus Group Reportedly Now Wielding Ransomware - Kaspersky Discovers 2 Incidents Involving VHD #Ransomware https://5gs.ec/2XjlpJ5

$82 trillion over 5 years? Cambridge study counts the cost of coronavirus - In case of speedy recovery, an "optimistic loss" of $3.3 trillion is likely. https://5gs.ec/2ZR9C6Z

Survey suggests almost half of Canadians can’t tell coronavirus fact from #ConspiracyTheory - 11% believe #COVID19 isn’t a serious illness but is being spread “to cover up harmful health effects associated with exposure to #5G wireless technology.” https://5gs.ec/2ZyUpam

How Traditional Machine Learning Is Holding #Cybersecurity Back - As the threat landscape has evolved, machine learning is failing to remain resilient in the face of advanced new malware, created by both hackers and #AI... https://5gs.ec/2DvLT2S

Huawei's 5G equipment pose no security risk: LG Uplus - Faced with mounting pressure to replace #Huawei #5G equipment, South Korean telecom giant LG Uplus has stressed the Chinese firm's telecom equipment does not pose any security risks. https://5gs.ec/2PivaCQ

Tangible Threat of #CyberKinetic Attacks - http://5G.Security Marin Ivezic - Connecting physical objects and processes to the cyber world offers us enormous capabilities. But it also introduces disquieting possibilities #Cybersecurity #IoT #4IR https://5gs.ec/2zBoif2

IT & OT Convergence: Sizing Up the Security Risks - "As the risks to IT and OT converge, organizations must ramp up their threat intelligence information sharing mechanisms and build a more comprehensive cybersecurity policy" https://5gs.ec/2XmZ4uf

5G Critical Infrastructure - the Most Critical of All - http://5G.Security Marin Ivezic - While the current narrative frames #5G #security as a privacy and a counter-espionage issue, the true threats are not purely digital, they are #cyberkinetic. https://5gs.ec/2yEYYFb

AI Is Neither the End of Civilization nor the Beginning of Nirvana - Marin Ivezic - Where #AI is taking us is one of the hottest topics being discussed. Perhaps the most striking thing about these discussions is how different people’s conclusions are https://5gs.ec/3dwQwGK

CISA, DOD, FBI expose new Chinese malware strain named Taidoor | ZDNet - US government agencies say the Taidoor remote access trojan (RAT) has been used as far back as 2008. #CyberSecurity https://5gs.ec/3k4ocQ2

Maritime #Cybersecurity-The Challenges, Best Practices and Risk Mitigation - As technology continues to develop, the convergence of IT and #OT onboard ships and their connection to the Internet creates an increased attack surface that needs to be addressed https://5gs.ec/3i9KZZ7

The US needs a new techno-democratic statecraft: Start with #5G - The US is drafting the opening lines of what will likely be of tremendous consequence: a new strategic competition, a contest of economic power rooted in technological capability. https://5gs.ec/2Xm2JZi

Intentional Electromagnetic Interference IoT Threat - http://5G.Security Marin Ivezic - Even among the #IoT #security professionals, one significant potential remote attack vector is often overlooked: intentional electromagnetic interference #IEMI https://5gs.ec/2SYK5EG

Load More...
5G Opportunity and Cybersecurity
Copy link