“The platform we have uses big data analytics and machine learning in the cloud to process and find all of the unknown malware, make it known and be able to block it,” says Scott Stevens, SVP, Global Systems Engineering at Palo Alto Networks. “We find 20-30 thousand brand new pieces of malware every day.”
We have done a study and we believe that by 2022 there will be over 400 million 5G connections, says Cisco CEO Chuck Robbins. “This is one of those great examples where the reality is going to match the hype building up to this. By 2022 the amount of new traffic created in that year will exceed all traffic that has ever been created since the inception of the internet.”
Symantec CEO Greg Clark says that there are many new cybersecurity threats showing up including threats around the Internet of Things. “The injection of consumer IoT in the enterprise and all through the home is important,” says Clark. There is definitely an ever-present threat in the IoT.”
We believe the Edge is the next frontier, says HPE CEO Antonio Neri. “When we talk about the enterprise of the future, we see an Edge centric cloud-enabled data-driven enterprise,” notes Neri. “What that means is the cloud is moving closer to where the data is created. That’s driven by the use cases we see around us.”
“All of us know the big job is how to manage it, access controls, security, know what data is where, and how much data you want flowing,” says IBM CEO Ginni Rometty. “We will be number one in what the world calls hybrid cloud.”
Cloud is just getting started says Okta CEO, Todd McKinnon. “We’re still in the early days of cloud adoption,” says McKinnon. “We’re very excited about the runway ahead and the value we can provide, in that context of really… cloud taking over the world.”
The advent of 5G is a big reason OpenX has decided to move to Google Cloud Platform, says OpenX CEO Timothy Cadogan. “When consumers start to move to 5G on their phones and have a very rapid experience, the advertising experience needs to be incredibly compelling.”
If you are a network person you have probably heard of BeyondCorp, but maybe you have had difficulty explaining it to others in your organization. Max Saltonstall says that Google has shifted to a security model where each access request is reevaluated as it is made.
Lime monitors data from their scooters and bikes in real-time in order to ensure that all bikes are charged and available to riders. In fact, in 2018 Lime monitored 26 million scooter and bike trips worldwide according to their year-end report.
IBM Resilient CTO and internet security guru Bruce Schneier takes a look at the security risks of the Internet of Things in his latest video. He brings up an interesting and rather disconcerting point, IoT devices tend to do critical things like turn on and off power or drive your car, so preventing hacking is even more critical with IoT than typical computers.