Ian Marsden, CTO at Eseye
Anyone connected to the Internet of Things (IoT) and M2M communications industries will be acutely aware of the levels of ambition and investment being set for the Embedded Universal Integrated Circuit Card, more widely known as eUICC, or the eSIM.
A 2017 report from IHS Markit, for example, suggests that eSIM shipments will increase from 109 million in 2016, to 986 million by 2021.
This growth will largely be driven by continuing IoT development, with eSIMs set to play a major role in ensuring the connectivity of billions of connected devices around the world.
The automotive industry is a prime example of a sector that has been keen to drive the technology forwards. With connected cars quickly becoming mainstream, the eUICC compliant eSIM has the potential to empower manufacturers by offering new opportunities to simplify logistics and optimise costs.
But industry ambition doesn’t stop there. The eSIM is being hailed as the next evolution of the SIM card, prompting vendors, operators and service providers to trial new eSIM-based edge solutions in an attempt to secure their position in the huge and growing global cellular, IoT and device connectivity markets.
Clearly, there is plenty of optimism around the eSIM, much of which is based on some key benefits being promoted by the IoT telecoms industry to customers. But, is there a gap between the perception and current reality of the eSIM?
Undoubtedly the most important benefit of eSIM technology – and the one most widely referred to – relates to enhanced provisioning.
Traditionally, SIM cards have been provisioned with the profile of a single mobile network operator (MNO), which once locked in, cannot be changed. This means customers must replace their SIM card every time they want to change operators. While this is a manageable task and something we are all used to when talking about a personal mobile phone, it has massive cost implications for IoT customers managing thousands, if not millions, of remotely located edge devices, over many years and across potentially vast areas.
With new, eUICC compliant eSIMs, the plan is for MNO provisioning to be managed over-the-air, with no physical access to the device required. The cards should be able to host multiple and changeable provider profiles when they are deployed. This should mean that customers can change carriers on a daily basis if they so wish, depending on business factors such as connectivity, resilience, customer service SLAs and the data rates available.
This requirement has significant implications for enterprises with large-scale IoT deployments. Embedded eSIMs remove the cost and logistics headaches that come with having to manually change a SIM card or network provider, as well, for example, as maximising device uptime by allowing a choice of the best local network operator.
There are also benefits for both manufacturers and operators to consider. As eSIM-equipped devices are ready to go straight out of the factory, IoT business managers and technologists can, in theory, streamline their logistics by removing the need for local device set up and configuration further down the supply chain, no matter where they are deployed.
With IoT customers being promised an improved cellular supplier negotiating position, increased management convenience and the removal of a considerable amount of complexity and risk of ongoing costs from operators, it’s easy to see why they are drawn to the eUICC compliant eSIM.
However, despite these benefits, the current eUICC specification doesn’t yet solve all the problems of IoT.
The Gap to eUICC delivery
The problem currently facing potential eSIM customers is that while industry discussions have so far focused on the potential benefits offered to businesses, there are also several commercial and technical challenges that will need to be understood and worked through over the coming months.
Operators are aware of the continuing commoditisation of M2M cellular data with this newly enabled, simple, least-cost transferring option. The whole point of eSIM technology is that, unlike traditional SIM cards, it provides a means of avoiding contractual lock-in. However, this is not in operators’ interests, and may not always benefit customers in the way they imagine.
IoT deployments can be complex. Organisations will increasingly rely on the reliable delivery of vast amounts of business – and possibly even life-critical – data, drawn from huge numbers of devices, across many different locations and environments. There is a cost to maintain and deliver this service, and while some companies can reduce the TCO of a deployment with specialist wrap-around services, dynamic multi-IMSI SIM technology and expert 24/7 IoT customer support, getting the data through will always come at a price.
In addition, although eSIMs might appear to offer an easier switching process for customers, this doesn’t necessarily mean that it is contractually any different and there will still be a procedure for customers to go through.
There are also some significant technology integration issues that will need to be overcome before adoption rates can really take off, primarily concerning remote provisioning. The industry has been keen to promote the idea that eSIMs enable customers to change their supplier at will, but in practice, both suppliers must be integrated at this tech level, in a way that allows data to flow.
Essentially, both parties not only have to agree to the transfer, the relevant systems must also be bolted together to actually make it happen. The device itself also has to be able to communicate with both platforms. From years of experience in dynamic IMIS routing and IoT device optimisation, I can say this is likely to be a longer and more complicated process than people think.
I believe eSIM standards are undoubtedly a move in the right direction, but there is still some way to go for eUICC to become the revolutionary innovation it is predicted to be.
Does your institution have operational resilience? Testing cyber resilience may be a good way to find out
By Callum Roxan, Head of Threat Intelligence, F-Secure
If ever 2020 had a lesson, it was that no organization can possibly prepare for every conceivable outcome. Yet building one particular skill will make any crisis easier to handle: operational resilience.
Many financial institutions have already devoted resources to building operational resilience. Unfortunately, this often takes what Miles Celic, Chief Executive Officer of TheCityUK, calls a “near death” experience for this conversion to occur. “Recent years have seen a number of cases of loss of reputation, reduced enterprise value and senior executive casualties from operational incidents that have been badly handled,” he wrote.
But it need not take a disaster to learn this vital lesson.
“Operational resilience means not only planning around specific, identified risks,” Charlotte Gerken, the executive director of the Bank of England, said in a 2017 speech on operational resilience. “We want firms to plan on the assumption that any part of their infrastructure could be impacted, whatever the reason.” Gerken noted that firms that had successfully achieved a level of resilience that survives a crisis had established the necessary mechanisms to bring the business together to respond where and when risks materialised, no matter why or how.
We’ll talk about the bit we know best here; by testing for cyber resilience, a company can do more than prepare for the worst sort of attacks it may face. This process can help any business get a clearer view of how it operates, and how well it is prepared for all kinds of surprises.
Assumptions and the mechanisms they should produce are the best way to prepare for the unknown. But, as the boxer Mike Tyson once said, “Everyone has a plan until they get punched in the mouth.” The aim of cyber resilience is to build an effective security posture that survives that first punch, and the several that are likely to follow. So how can an institution be confident that they’ve achieved genuine operational resilience?
This requires an organization to honestly assess itself through the motto inscribed at the front of the Temple of Delphi: “Know thyself.” And when it comes to cyber security, there is a way for an organization to test just how thoroughly it comprehends its own strengths and weaknesses.
The Bank of England was the first central bank to help develop the framework for institutions to test the integrity of their systems. CBEST is made up of controlled, bespoke, intelligence-led cyber security tests that replicate behaviours of those threat actors, and often have unforeseen or secondary benefits. Gerken notes that the “firms that did best in the testing tended to be those that really understood their organisations. They understood their own needs, strengths and weaknesses, and reflected this in the way they built resilience.”
In short, testing cyber resilience can provide clear insight into an institution’s operational resilience in general.
Gaining that specific knowledge without a “near-death” experience is obviously a significant win for any establishment. And testing for operational resilience throughout the industry can provide some reminders of the steps every organization should take so that testing provides unique insists about their institution, and not just a checklist of cyber defence basics.
The IIF/McKinsey Cyber Resilience Survey of the financial services industry released in March lasy year provided six sets of immediate actions that institutions could take to improve their cyber security posture. The toplines of these recommendations were:
- Do the basics, patch your vulnerabilities.
- Review your cloud architecture and security capabilities.
- Reduce your supply chain risk.
- Practice your incident response and recovery capabilities.
- Set aside a specific cyber security budget and prioritise it
- Build a skilled talent pool and optimize resources through automation.
But let’s be honest: If simply reading a solid list of recommendations created cyber resilience, cyber criminals would be out of business. Unfortunately, cyber crime as a business is booming and threat actors targeting essential financial institutions through cyber attacks are likely earning billions in the trillion dollar industry of financial crime.A list can’t reveal an institution’s unique weaknesses, those security failings and chokepoints that could shudder operations, not just during a successful cyber attack but during various other crises that challenge their operations. And the failings that lead to flaws in an institution’s cyber defence likely reverberate throughout the organization as liabilities that other crises would likely expose.
The best way to get a sense of operational resilience will always be to simulate the worst that attackers can summon. That’s why the time to test yourself is now, before someone else does.
Thomson Reuters to stress AI, machine learning in a post-pandemic world
By Kenneth Li and Nick Zieminski
NEW YORK (Reuters) – Thomson Reuters Corp will streamline technology, close offices and rely more on machines to prepare for a post-pandemic world, the news and information group said on Tuesday, as it reported higher sales and operating profit.
The Toronto-headquartered company will spend $500 million to $600 million over two years to burnish its technology credentials, investing in AI and machine learning to get data faster to professional customers increasingly working from home during the coronavirus crisis.
It will transition from a content provider to a content-driven technology company, and from a holding company to an operational structure.
Thomson Reuters’ New York- and Toronto-listed shares each gained more than 8%.
It aims to cut annual operating expenses by $600 million through eliminating duplicate functions, modernizing and consolidating technology, as well as through attrition and shrinking its real estate footprint. Layoffs are not a focus of the cost cuts and there are no current plans to divest assets as part of this plan, the company said.
“We look at the changing behaviors as a result of COVID … on professionals working from home working remotely being much more reliant on 24-7, digital always-on, sort of real-time always available information, served through software and powered by AI and ML (machine learning),” Chief Executive Steve Hasker said in an interview.
Sales growth is forecast to accelerate in each of the next three years compared with 1.3% reported sales growth for 2020, the company said in its earnings release.
Thomson Reuters, which owns Reuters News, said revenues rose 2% to $1.62 billion, while its operating profit jumped more than 300% to $956 million, reflecting the sale of an investment and other items.
Its three main divisions, Legal Professionals, Tax & Accounting Professionals, and Corporates, all showed higher organic quarterly sales and adjusted profit. As part of the two-year change program, the corporate, legal and tax side will operate more as one customer-facing entity.
Adjusted earnings per share of 54 cents were ahead of the 46 cents expected, based on data from Refinitiv.
The company raised its annual dividend by 10 cents to $1.62 per share.
The Reuters News business showed lower revenue in the fourth quarter. In January, Stephen J. Adler, Reuters’ editor-in-chief for the past decade, said he would retire in April from the world’s largest international news provider.
Thomson Reuters also said its stake in The London Stock Exchange is now worth about $11.2 billion.
The LSE last month completed its $27-billion takeover of data and analytics business Refinitiv, 45%-owned by Thomson Reuters.
(Reporting by Ken Li, writing by Nick Zieminski in New York, editing by Louise Heavens and Jane Merriman)
Putting data protection back on the financial agenda
By Wim Stoop, CDP Customer and Product Director, Cloudera
Despite the wave of changes that Brexit has brought financial organisations, from the end of ‘passporting’ to uncertainty over the longer-term equivalence rules, one thing has remained a constant — data privacy regulations are a core responsibility to protect sensitive data and mitigate data breaches. From PSD2 to GDPR, financial institutions need to ensure they are still processing and transferring data in accordance with the industry’s stringent rules and regulations. If not, they risk fines of up to £17.5 million or 4% of their company’s annual global turnover.
As the stakes get higher, the amount of data which financial enterprises are having to deal with is on the rise too. In fact, research by IDC estimated that businesses created and captured 6.4 zettabytes of new data last year alone. This increase in data production has linked to the pandemic and the move to remote working. Replacing face-to-face interactions with online communications has meant that financial businesses suddenly had to cope with a larger amount of data flowing through their networks. In addition, employees working from home are increasingly doing so on potentially unsecured devices, outside of the corporate network, risking exposure and data breaches according to numerous cybersecurity reports.
With an extensive stock of sensitive customer data and so many regulations to keep on top of, remaining compliant can feel overwhelming for financial organisations. However, this shouldn’t be the case. Today we often see businesses trying to retrofit data protection strategies, or take a reactive approach to external forces. Instead, they should be taking a proactive stance on data management. In doing so, security becomes a natural side-effect and financial companies can operate with the assurance that no matter what new regulations come into play, they are compliant. The question is, how to achieve this?
Taking a proactive approach to data privacy
To remain compliant, financial institutions need to get on top of their data. When data is sat in siloes, on legacy systems, it’s inaccessible to all and it becomes a challenge to identify what is sensitive and what isn’t. Poorly managed data can’t be protected and the risk of data breaches increases. By contrast, when properly controlled and stored, it becomes easy to apply data security rules.
From customer names and contact details to transaction records and PINs, financial organisations hold a lot of personal and financial data on customers. However, the trick is understanding that all data holds varying degrees of sensitivity and thus, needs to be managed accordingly. For instance, a customer’s bank account details are more sensitive, compared to their basic personal data, such as name and address, which are usually publicly accessible. By proactively identifying, prioritising and classifying data by its degree of sensitivity, financial companies can apply any and all data protection rules that are necessary, such as restricting certain users from accessing highly confidential information.
Yet, this identification process is often looked at as a reactive measure by many financial businesses. The challenge in proactive data management lies in an organisation’s ability to eliminate the frictions it has in tracking, identifying and classifying information, as opposed to doing so retrospectively. After all, data classification plays a vital role in ensuring data protection is upheld.
A proactive approach is integral to effective data management and governance. The first step in achieving this approach involves creating a data marketplace, or a curated, secured and governed data repository. Having something like a data marketplace in place means that as soon as data enters an organisation, enterprises can determine its degree of sensitivity, how it should be managed, and which analytics need to be run, to extract the most value out of the data.
Once these steps are taken, compliance and data privacy happen almost naturally and become ingrained in the business. When companies are aware of every single piece of data in their possession, they can know exactly how it’s being protected. Such a robust strategy ensures that institutions meet the high standards of trust that their customers have bestowed upon them in protecting their personal data. And, with this level of control, enterprises can avoid data lockout, reduce friction for employees, and optimise the value they unlock from their data. At the same time, they can have the peace of mind that they are compliant and protected.
A business-ready solution for data protection
With so many rules and regulations to keep track of, data protection shouldn’t be another worry to add to the list. Financial companies can maximise the efficacy of their existing security and governance strategies by applying it to all datasets across the enterprise – whether that be on-premise, in the cloud, or a combination of the two. In particular, as a scalable and low-cost solution, organisations are increasingly turning to the cloud for their data management needs. It’s expected that over half (51%) of business data will be stored in the cloud by 2024.
This is where an enterprise data cloud (EDC) really shows it’s worth, allowing financial companies to keep their data protected, compliant, and successfully governed. Simply put, an EDC is a hybrid and multi-cloud platform that harnesses analytics at every stage of the data lifecycle. It enables organisations to extract the true value of their data while still providing a consistent layer of security.
An EDC gives financial businesses a single source of truth, built on technology that operates on any cloud environment and right through to the edge. Armed with an EDC, companies have complete visibility over their data, no matter where it resides in the enterprise or the data lifecycle, easing the task of managing and protecting data. On top of this, an EDC supports a variety of data functions, including the data marketplace, and works to provide control, visibility and examination over data. With all these aspects working together, financial institutions can ensure that all data which passes through their infrastructure and into the data marketplace is efficiently governed and protected.
Bringing technology, people, and process together
Technological solutions, like an EDC, work at their maximum potential when they are in harmony with people and process. But, the triad has been thrown off balance by the rise of remote working and reduction in staff numbers. While all businesses recognise that sensitive data needs to be encrypted and access should be restricted, this has been a difficult feat as employees work from home and use devices outside of the traditional network security parameters. In fact, nearly half (48%) of employees are less likely to follow safe data practices when working from home. This will exponentially increase the risk of data breaches.
In addition, with almost a fifth (18%) of the UK workforce on furlough and team numbers shrinking, companies don’t have the same amount of manpower to validate both the systems being used, as well as the data being run in these systems, to ensure that they are compliant. Within the office environment, organisations were able to create ‘islands of perfect governance’, with all departments being aware of the applications used to manage data and therefore, guaranteeing higher levels of compliance. However, these safety nets have collapsed during home working and it’s become more difficult to ensure the security and privacy of data within an enterprise.
What’s needed here is an overarching framework that provides a standard for data governance. This is enabled by having the right technology solution, a proactive approach to data management and people within a business supporting it from the bottom up in place — forming a triad that works in perfect harmony. A framework such as this also enables enterprises to assess what they need to do to create data protection rules internally that ensure compliance, and allows employees to self-check their data security protocols eliminating any uncertainty about protecting sensitive data.
It is important to remember that the right technology alone won’t make people compliant – whether they are working in an office or remotely. Rather, as pointed out above, it is technology, people, and process, working in sync, that will ensure that regulations are adhered to and data is managed and protected.
Long-lasting success with data protection
With data volumes growing and remote working creating security vulnerabilities, financial businesses need to get on top of their data from the get-go. By proactively identifying sensitive data, accurately securing it, and delivering trusted data to end-users, the right data can be put into the hands of the right people.
Creating a watertight data privacy strategy requires financial organisations to deliver a uniform approach to data management and protection across departments to ensure compliance. In addition, harnessing technology, such as an EDC, will provide visibility and control over sensitive data, enabling financial institutions to unlock real-time insights from their data while still providing a consistent layer of security. With technology, people and process in harmony, enterprises can operate with the confidence that their data is being managed successfully and they are compliant with both existing and new regulations.
Bitcoin slumps 6%, heads for worst week since March
By Ritvik Carvalho LONDON (Reuters) – Bitcoin fell over 6% on Friday to its lowest in two weeks as a...
Stock markets roiled by global bond whiplash
By Tom Arnold and Wayne Cole LONDON (Reuters) – Global stocks fell on Friday, with Asian shares down by the...
British insurer RSA profit rises ahead of takeover
LONDON (Reuters) – British insurer RSA’s 2020 operating profit rose 15% to 751 million pounds ($1.05 billion), it said on...
Britain’s Sainsbury’s gives staff third pandemic bonus
LONDON (Reuters) – Britain’s second largest supermarket group Sainsbury’s will award its staff a third bonus for their efforts during...
China’s Ant to boost consumer finance unit capital as it restructures micro-lending – sources
By Julie Zhu HONG KONG (Reuters) – China’s Ant Group is in talks with other shareholders in its new consumer...