Tag: Cybersecurity

AI’s Dark Side – They’re Listening

AI’s Dark Side – They’re Listening

Hear that? Someone is listening. In fact, they all are: Google, Microsoft, Amazon, even Apple (who has positioned itself as a privacy champion). AI - more specifically the neural networks that power voice assistants - are far from fully autonomous. Deep learning models require human assistance at this juncture. Fair. It is when companies do … Continue reading AI’s Dark Side – They’re Listening

Advertisements
The Software Treadmill: Keep Pace or Fall Behind

The Software Treadmill: Keep Pace or Fall Behind

The software industry is fluid and unforgiving - especially the CyberSecurity space. Companies either innovate or fall behind. There is no such thing as standing still. This week semiconductor firm Broadcom (tkr: AVGO) agreed to acquire Symantec's Enterprise business. Symantec (tkr: SYMC), is a CyberSecurity software vendor and is a laggard in an industry that's … Continue reading The Software Treadmill: Keep Pace or Fall Behind

CyberSecurity Is Not Someone Else’s Problem

CyberSecurity Is Not Someone Else’s Problem

We have definitely entered a period of CyberSecurity fatigue. When Capital One's (tkr: COF), stock barely gets hit in the aftermath of a significant CyberBreach you know many investors - as Rhett Butler once said - "don't give a damn". CEO's need to "own" CyberSecurity and operate it like a line of business. Customer PII … Continue reading CyberSecurity Is Not Someone Else’s Problem

We Applaud Creative M&A Strategies

We Applaud Creative M&A Strategies

It has leaked that semiconductor giant Broadcom (tkr: AVGO) is working to acquire CyberSecurity software company Symantec (tkr: SYMC).  Semiconductor investors are not fans of the deal as AVGO shares have traded off 6% since the news leaked. Conversely, we like the prospective acquisition for a couple of reasons: First, Symantec’s recurring revenues will help … Continue reading We Applaud Creative M&A Strategies

Use Two-Factor Authentication (“2FA”) to Reduce the Risk of Compromised Data

Use Two-Factor Authentication (“2FA”) to Reduce the Risk of Compromised Data

Two-factor authentication or 2FA is virtually painless and greatly mitigates the risk of compromised personal and enterprise data. People don’t like to be told “take your medicine” much less read about it. However, an ounce of prevention goes a long way. Whether you wish to add a layer of security beyond the common password to … Continue reading Use Two-Factor Authentication (“2FA”) to Reduce the Risk of Compromised Data

CyberSecurity Should Be A CEO and Board-level Priority

CyberSecurity Should Be A CEO and Board-level Priority

Fortune 500 real estate title insurer First American Financial Corp. (ticker: FAF) leaked hundreds of millions of documents related to mortgage transactions dating back to 2003. CEOs and Boards Need to Make CyberSecurity A Top Priority We have previously taken the position on our podcast and in this newsletter that CyberSecurity is a C-level/ Board-level … Continue reading CyberSecurity Should Be A CEO and Board-level Priority

Our Evite for 1984

Our Evite for 1984

We've rolled out the red carpet for an Orwellian-like scenario. Here's how. 1.) Meta-collection of phone calls by the NSA under the Patriot Act. Essentially zero push back by we the people. This is child's play as compared to the information we willingly volunteer via personal smart devices. 2.) Broad adoption of smart devices with … Continue reading Our Evite for 1984

CES Week: Device OEMs Should Not Underestimate Consumers’ Concerns Around Data Privacy and CyberSecurity.

CES Week: Device OEMs Should Not Underestimate Consumers’ Concerns Around Data Privacy and CyberSecurity.

Lots of cool new consumer devices will be on display at CES this week. Personally I enjoy video-related technology because if a picture is worth 1,000 words, how many words is a video worth? We’re working to incorporate more video content into our messaging this year. One message that I will be watching for coming … Continue reading CES Week: Device OEMs Should Not Underestimate Consumers’ Concerns Around Data Privacy and CyberSecurity.

The Three Rings of Amazon (AMZN)

The Three Rings of Amazon (AMZN)

Amazon's 1st Ring Amazon's Core Services Portfolio drives the company's macro strategy. AMZN's more recent product and service offerings (both organic and acquired offerings) are covered in the "2nd Ring" and "3rd Ring" sections and serve to strengthen the Core portfolio.  Amazon.com: Amazon's crown jewel. The world's broadest and deepest ecommerce platform.  Amazon Web Services (AWS): … Continue reading The Three Rings of Amazon (AMZN)

AT&T’s Proposed Acquisition of Time Warner – Justice Department is Misguided<span class="badge-status" style="background:red">Premium</span> 

AT&T’s Proposed Acquisition of Time Warner – Justice Department is MisguidedPremium 

AT&T Ought to Be Allowed to Acquire Time Warner "As Is" AT&T (T) ought to be allowed to acquire Time Warner (TWX) “as is” (earlier today AT&T extended the deal close deadline to April 22 2018). It is puzzling why the Justice Department would push back on the deal. We recently covered the topic in … Continue reading AT&T’s Proposed Acquisition of Time Warner – Justice Department is MisguidedPremium