Skip to main content

BlackBerry CEO John Chen and Rudy Giuliani sat down to talk cybersecurity

john chen rudy giuliani interview ces 2017 pjimage
Rudy Giuliani is no stranger to the cybersecurity industry. The former New York City mayor’s consulting business, Giuliani Partners, advises clients on related fields like anti-terrorism, crime reduction, and even the protection of sensitive facilities like desalinization facilities and chemical companies. He made an appearance at BlackBerry’s Security Summit last summer, where he discussed his joint effort with Blackberry to provide cybersecurity solutions for his clients. At the Consumer Electronics Show in Las Vegas, he cemented that partnership in ink: Going forward, all of Giuliani Partners’ clients will use BlackBerry software and its internet security platform.

In a roundtable with members of the press, Giuliani and John Chen, the chief executive of BlackBerry, sat down to talk about broader trends in cybersecurity.

Related Videos

Computer crimes, Giuliani said, are generally on the upswing. “It’s is the fastest growing form of crime. It’s growing at rates that are almost impossible to calculate in almost every country,” he said. And cyber crime is becoming a larger part of Giuliani Partner’s consulting businesses. “A lot of consulting has involved cyber.”

There is a lot at stake. Giuliani Partners’ clientele includes small enterprises and operations, but government agencies, too. “When we get beyond the commercial and the harassment hacking, there are issues of national security,” Giuliani said. “There are many sensitive facilities and electrical systems.”

Worsening matters is a reluctance on the part of those clients to disclose data breaches and other forms of hacking. “In the past, there was [an unwillingness] to disclose successful attempts,” Giuliani said. “Private companies tried to do it on their own.”

That is why Giuliani partnered with BlackBerry. “They’ve developed some of the most secure software in the world,” he said.

Giuliani believes the biggest cybersecurity threats today are data theft — the surreptitious gathering of sensitive personal information like contact information, phone numbers, and email addresses — and ransomware, the infection of devices like cameras, temperature sensors, smart locks, and automation products for the purpose of extortion. “It’s the idea of a hacker taking a whole business or hospital down in exchange for money.”

Cybersecurity’s underlying dilemma, Giuliani said, is that it hasn’t kept pace with the tech industry’s other innovations. “We fell behind as a society,” he said. “We fell in love with all of our devices — and our ability to gain information. But we didn’t think about the fact that we have to increase defenses as we increase the amount of information we’re putting in the cloud.”

Chen used an example from BlackBerry’s Security Summit earlier this year to illustrate ransomware’s damaging potential. “A hacker could infiltrate a network with a Wi-Fi-connected home coffee pot,” he said. As long as the appliance in question shares the same network as every other device in an urgent care, a nefarious coder could “watch over other people’s login.” From there, the hacker in question could gain access to, say, an internet-connected morphine infusion pump and alter a patient’s dosage.

The problem’s exacerbated by the burgeoning Internet of Things. “Eventually, the world is going to connect the home, car, and office,” said Chen. “You’ll be able to update records, bring them to your car, and finally to your home Wi-Fi. A hacker could easily access your Wi-Fi and change those records at every transfer point.”

Giuliani contends that a lack of legislative — and regulatory — boundaries presents an added challenge. “We need more legislation” with to sectors like banking, Giuliani said. In U.S., he predicts regulations will emerge in the form of new Security and Exchange Commission (SEC) rules. “Business with banks requires a lot of cybersecurity — there’s a lot of activity and a person can lose a lot of money.”

Giuliani believes that fear of cyber breaches and theft has dampened innovation. He gave the example of a “health record card”: a single, compact credit card-sized device that could hold a person’s entire medical record. “You would know as much about me as my doctor knows about me,” he said. “But many people resist the idea because they think it can be hacked or stolen.”

It ultimately comes down to proactivity, Giuliani said. “When I talk to people about cybersecurity, I recommend they approach it in two phases: Buy the best possible defense you can afford, and the best possible detection mechanism.”

Editors' Recommendations

Hackers stole $1.5 million using credit card data bought on the dark web
A credit card is passed from one person to another.

In what sounds like a movie script, over $1 million was stolen by a group that made use of thousands of credit cards posted for sale on the dark web. Some of the details of this complex cybercrime operation have come to light following an indictment by the U.S. Department of Justice.

In the United States v. Trevor Osagie, the defendant has pled guilty to conspiracy to commit credit card fraud from 2015 to 2018. Osagie worked with a network of thieves and managed to rack up over $1.5 million in damages.

Read more
MacBook butterfly keyboard lawsuit: are you eligible for a payout?
MacBook Butterfly Keyboard

Apple is proceeding with compensating the owners of MacBook laptops sold between 2015 and 2019 that featured the infamously faulty butterfly keyboards.

After settling a class-action lawsuit in July, in which the company agreed to pay $50 million in damages, Apple is now moving forward with payments for those eligible. Here's how to know if you're included, how much you'll get paid, and how to submit your claim.
How to know if you're eligible
Apple has begun emailing MacBook owners with instructions on how to know if they are eligible for compensation and how to be approved for their payments. Recent emails sent out to MacBook owners indicate that a settlement has now officially been reached, meaning Apple has continued to deny any of the claims about defective keyboards, but has agreed to settle with a $50 million payout.

Read more
iPhone 14 satellite connectivity: how it works, what it costs, and more
Person holding iPhone 14 searching for Emergency SOS satellite.

One of the most exciting features in Apple's iPhone 14 and iPhone 14 Pro is one that you'll hopefully never need to use: the ability to summon help in an emergency using satellites.

Dubbed Emergency SOS via satellite, this new feature allows iPhone owners to reach out to emergency services from just about anywhere on the planet — even when far away from cellular and Wi-Fi networks. While it initially launched in the U.S. and Canada, Apple has also expanded its reach to four European countries and has more international expansion plans underway for next year.

Read more