“Safety should be the next big differentiator”



Adam Weinberg of FirstPoint Mobile Guard explains how 5G will increase the pace of change and the importance of cellular security.

With over 35 years of expertise, Adam Weinberg is a pioneer in the cybersecurity industry and co-founder and CTO of FirstPoint Mobile Guard.

FirstPoint Mobile Guard develops cellular cybersecurity solutions for organizations and aims to protect them at the network level.

Prior to FirstPoint, Weinberg held leadership roles in research and development at Verint, a software company formerly a subsidiary of Comverse Technology, and in the cyber and intelligence division of Nice Systems.

Weinberg holds a master’s degree in physics from the Technion, Israel Institute of Technology and holds five patents in cybersecurity and mobile technology.

“What are the security implications of a cell phone connected pen or shoe? It remains to be seen ‘

Describe your role and responsibilities in driving the technology strategy.

As CTO at FirstPoint, my primary responsibilities are to lead the process of setting future directions and goals for our product. As part of my role, I oversee the development and architectural aspect of our cellular security solutions, helping our clients stay safe from the ever increasing and pervasive threats of mobile cyber attacks.

This includes aligning technology-related decisions with business goals, budgeting, ensuring that our product and technology infrastructure meets the needs of our existing customers and partners, and suggesting new technologies to be implemented. implemented, following interactions with external partners.

Are you spearheading a major IT product or initiative that you can tell us about?

Connectivity is the name of the game for many of the activities and services we consume. As a result, we are seeing an increasing need for security for connected cellular devices. Personal cell phones have become a staple in most countries and we are seeing a growing demand for IoT devices that rely on a cellular connection.

We focus on eliminating device manipulation by protecting sensitive data with a comprehensive mobile network-based approach that increases trust, from 2G to 5G for IoT devices and personal phones.

How big is your team ?

From the start, our approach was based on in-house professionals who have the unique knowledge and expertise we need to develop our patent-based technology. Even today, having grown to dozens of employees, we are still 100% dependent on internal development to ensure quality and safety.

What do you think of the digital transformation?

Even though Covid was chosen by the American Dialect Society as the Word of the Year 2020, the phrase digital transformation has undoubtedly been intensely accelerated after the pandemic crisis.

Large-scale IoT services are making waves across industries with self-driving cars, smart cities, connected medical devices, mission-critical services, and the list goes on. Needless to say, the emergence of 5G will only accelerate the pace of change.

Digital transformation has made people intensely connected and dependent on their mobile phones. Connected devices and the massive adoption of IoT are practically everywhere and inevitably part of the digital transformation. With threats increasing in sophistication and number, we are all called upon to improve our connectivity security solutions.

What major technological trends do you think are changing the world and your industry in particular?

5G is booming, offering vastly improved connectivity services. We see many businesses looking for ways to manage and scale with new connectivity options.

By 2025, 320 million 5G subscribers are expected in the United States alone, according to telecommunications giant Ericsson. In addition, 5G will help further expand the use of IoT due to its improvements in latency and bandwidth.

As 5G hits the ground running, security is expected to be the next big differentiator and will continue to be the case for years to come. Of course, when new technology is introduced, new flaws are discovered.

A great effort has been invested in 5G, improving the security and privacy of users and attempting to solve the well-known security problems of previous generations of cellular networks (2G, 3G, 4G).

However, considering the complexity of the network structure and operation on the one hand, and the high potential damage to privacy and vital services on the other hand, I would say that the implementation of the 5G network is still subject to a very significant risk of cyberthreats and present a challenge to security efforts.

In fact, despite the main security features included in the 5G design, security holes are still reported in 5G networks, posing a considerable risk to operators and users of 5G networks.

With 5G already being implemented, the march of technology awaits no one. Ultra-fast 6G is already under discussion. What are the security implications of a cell phone connected pen or shoe? It remains to be seen.

In terms of security, what do you think of how we can better protect data?

While it may seem that the potential security risks are endless and threatening, there is much we can do to protect ourselves and our organizations. Individuals should, of course, practice standard cyber hygiene. Use only certified devices and known services. Sensitive users facing high risk threats should consider adding dedicated cellular protection services.

Yet one of the main risk factors is the human factor – it can’t be assumed that people won’t make security mistakes. After all, making mistakes is one of the basic traits of being human. Therefore, security must be implemented in the background without depending on human behavior.

Want stories like this and more straight to your inbox? Register for Technological trends, Silicon Republic’s weekly digest of essential technological news.


Leave A Reply

Your email address will not be published.