Agribusiness is New Tech Battleground for Australia’s Telcos

M. Rogers

Summary Bullets:

• TPG and Telstra have had multiple trials with various agribusiness in Australia, leveraging 5G, AI, IoT, and data services to develop solutions for livestock.

• Both companies have yet to develop commercialized solutions, and could consider joint ventures with or acquisitions of agritech firms to fully capitalize on the vertical opportunity.

Cows, potatoes, and tomatoes could be the next tech and telco battleground in Australia. Leading telcos Telstra and TPG have both made recent announcements around their efforts to develop converged technology offerings centered on agriculture use cases.

Continue reading “Agribusiness is New Tech Battleground for Australia’s Telcos”

Cybersecurity: Corporate Boards Take a Reactive Approach to Security

Amy Larsen DeCarlo – Principal Analyst, Security and Data Center Services

Summary Bullets:

• Though more than 76% of the surveyed corporate directors say their boards had at least one cybersecurity expert member, only one-third highly regarded their board of directors’ ability to navigate a security disaster.

• Leadership is not as proactive as it should be in getting ahead of incidents. Fewer than half of the board of directors who participated in the study had conducted cybersecurity tabletop exercises in the last 12 months.

The Wall Street Journal and the National Association of Corporate Directors surveyed 472 directors across all industries about their current cyber risk management postures and their respective levels of preparedness. The survey comes in advance of new US Securities and Exchange Commission (SEC) requirements that public companies release uniform reports on cybersecurity risk management, governance, incident reports, and cybersecurity expertise within their board of directors. The survey results paint a mixed picture that reveals a fairly high level of expertise but a largely reactive approach to security.

Continue reading “Cybersecurity: Corporate Boards Take a Reactive Approach to Security”