Rakuten CEO Mickey Mikitani says he’s happy he didn’t choose to use Huawei and ZTE. “I kind of sensed the potential risk even if it’s only one percent,” said Mikitani. “I told myself actually I cannot take a one percent risk that something may happen to prohibit Chinese network equipment to be used for the Japanese mobile network.”
The CEO of Cisco says that last year they blocked seven trillion cybersecurity threats or about 20 billion per day. He says that by and large cybersecurity organizations inside of their customers are very good.
If you are a network person you have probably heard of BeyondCorp, but maybe you have had difficulty explaining it to others in your organization. Max Saltonstall says that Google has shifted to a security model where each access request is reevaluated as it is made.
“We’re massively going for the expansion into this multi-cloud world,” says Björn Goerke, SAP CTO & President of the SAP Cloud Platform. “We strongly believe that the world will remain hybrid for a number of years and we’re going in that same direction with the SAP Cloud Platform.”
IBM Resilient CTO and internet security guru Bruce Schneier takes a look at the security risks of the Internet of Things in his latest video. He brings up an interesting and rather disconcerting point, IoT devices tend to do critical things like turn on and off power or drive your car, so preventing hacking is even more critical with IoT than typical computers.
Retired Maj. Gen. Robert Scales says that we are already starting to see the manifestation of this hacking in the weapons they are deploying as we speak.
We are still in the very early days of cloud adoption in the enterprise says ServiceNow CEO, John Donahoe. Also, something that is often overlooked is that governments are finally embracing the cloud which presents a huge opportunity to all of the big cloud players.
IBM’s $33 billion all-cash deal for Red Hat is expected to literally reset the cloud landscape says IBM CEO Ginni Rometty. “This now changes the cloud battle to open, which is what we both are together, to proprietary. This allows them to move mission-critical work safely and securely,” said Rometty.