BROWSING: Devices

Verizon adopts Fhoosh cybersecurity for SDP service

Verizon and Fhoosh strengthen partnership Cybersecurity software company Fhoosh announced it is collaborating with Verizon to boost the company’s Software Defined Perimeter (SDP) service with fast end-to-end data protection. Verizon’s SDP secures the connectivity between customer protected applications and authorized endpoints. What makes the solution different,...

WhiteHat combats code vulnerabilities with Sentinel Source for Microservices

WhiteHat boosts SAST services portfolio WhiteHat Security recently expanded its portfolio of static application security testing (SAST) services with the addition of Sentinel Source for Microservices, which is aimed at companies currently embracing microservices-based architecture. Microservices architecture involves piecemealing large-scale monolithic code into isolated chambers known...

IBM: telecom service providers express interest in blockchain potential

IBM report highlights service provider executives’ perspectives on blockchain Although blockchain only recently made its way onto the telecom stage, communications service providers (CSP) executives are already expressing interest in the technology. That is at least the conclusion of a recent report by the IBM Institute...

Twistlock 2.3 brings serverless security to container platform

Container security vendor premiers Twistlock 2.3 Container security company Twistlock announced the availability of Twistlock 2.3 with a focus on protecting container workloads. The debut marks the 12th release of the company’s main product with new features like cloud native firewall, app aware system call...

Machine learning comes to Kubernetes with Kubeflow project

New Kubeflow project brings machine learning to Kubernetes Google engineers recently announced a new project dubbed Kubeflow, which leverages machine learning to address the hurdles of launching convoluted workloads on Kubernetes. Kubernetes is an open source platform that serves as the backbone of container orchestration management....

Zain Group, Cisco collaborate on network transformation

Zain Group, Cisco work to meet demands placed on network infrastructure Zain Group and Cisco announced the former is leveraging the latter’s segment advanced routing platforms and WAN automation to introduce the advantages of distributed intelligence and centralized control to its network. Zain Group is a...

Thales acquires Gemalto for $5.6 billion to advance digital security

Thales outbids Atos for Gemalto French aerospace specialist Thales outbid Atos for Dutch cybersecurity provider Gemalto. The company has agreed to purchase Gemalto for $5.6 billion, surpassing Atos’s bid valued at $5.06 billion. Gemalto is considered the world’s largest manufacturer of SIM cards and credit cards....

Nokia provides data context with processing software solution

Nokia unveils Data Refinery solution Nokia premiered a new data processing software today called Nokia Data Refinery, formerly Comptel Data Refinery, which aims to provide real-time data for context-aware intelligence. According to the company, Nokia Data Refinery provides intelligent fast data processing to power complex event...

The role of blockchain in telecommunications

Beyond Bitcoin Blockchain is a buzzword frequently making news headlines, largely due to the numerous use cases it opens up. With roots tracing back to Bitcoin, the potential of blockchain exceeds digital currency and to a host of other industries, including telecommunications. The only question...

Ericsson: In 2018, line between user and device continues to blur

Each year Ericsson looks ahead at consumer technology trends that will likely shape the way humans interact with their devices and with each other. In its latest report, The 10 Hot Consumer Trends for 2018 and Beyond, a theme emerges of a continuously more...

Bell becomes first operator to launch ONAP in production

Bell deploys product with ONAP platform Canadian telecommunications company Bell announced it has become the first company to launch an open source version of the Open Network Automation Platform (ONAP) in production. The announcement was noted by Arpit Joshipura, general manager of networking and orchestration at...

CNCF announces Kubernetes 1.9 with a focus on stability

Kubernetes 1.9 moves Workloads APIs to stability The Cloud Native Computing Foundation (CNCF) announced version 1.9 of the container orchestration and management platform Kubernetes is expected to be released December 13 with various updates and expanded features. The release follows on the heels of the...

EasyStack EKS eyes enhancing DevOps, security and interoperability

EasyStack launches EasyStack Kubernetes Service (EKS) EasyStack, an open source cloud computing solutions provider in China, premiered EasyStack Kubernetes Service (EKS) at the KubeCon + CloudNativeCon 2017 in Austin, Texas, with capabilities like orchestration, scheduling, security, operations and maintenance holding the spotlight. Kubernetes, a platform that...

Meet the Qualcomm Snapdragon 845 mobile platform

Snapdragon 845 brings major advancements in immersive AV, AI, security, connectivity and performance For the past five year, Qualcomm Technologies has spent more than $1 billion per quarter on research and development. Last week, with a bevy of executives, partners, press and analysts on hand...

Augmented reality framework materializing through ETSI spec group

ETSI premieres new augmented reality group Rolling into the augmented reality (AR) space, the European Telecommunications Standards Institute (ETSI) launched a new Industry Specification Group called Augmented Reality Framework (ISG ARF) yesterday. The purpose of the group is to define a framework for the interoperability...

Qualcomm and Apple escalate legal battle

"Make calls, keep records, send email, browse the web and run over a thousand different applications, all while on the go..." This holiday ad for "one of the first truly portable, mobile and multipurpose Internet devices” appeared 18 years ago, before the term 'smartphone' was...

Akamai report finds upswing in web app security attacks

2017 State of the Internet Security Report discovers web app attacks on the rise Akamai Technologies published its third quarter 2017 State of the Internet Security Report, revealing a 30% increase in web application attacks in the third quarter of 2017 in comparison to the...

Qualcomm outlines royalty rates for 5G NR smartphones

For a $500 5G NR smartphone, Qualcomm could charge up to $16.25 for access to patented technologies The 5G NR (New Radio) standard is crystallizing and is expected to be finalized with 3GPP Release 15 in mid-2018. The result of an industry-wide collaborative process, the...

Fortinet extends virtualized Security Fabric apps to AWS users

AWS joins Fortinet Fabric-Ready Partner Program Fortinet, a global leader in high-performance cybersecurity solutions, announced it has extended its virtualized Security Fabric applications to Amazon Web Services (AWS) customers with an encompassing set of solutions that can be managed through a centralized console. The agreement...

CloudPassage tackles container security with new solution

CloudPassage launches Container Secure Cloud storage and security provider CloudPassage unveiled an encompassing set of automated compliance and controls for containers dubbed “Container Secure” today. The solution covers five key elements of container security, including host security, continuous image assurance, runtime configuration assessment, visibility and compliance,...

Docker, Kubernetes gain Sumo Logic native support

Sumo Logic releases unified logs and metrics solution for Kubernetes and Docker Sumo Logic, a cloud-based log management and analytics service provider, announced a first-to-market unified logs and metrics solution aimed at improving applications running on Kubernetes and Docker. Docker and Kubernetes are two container management...

Kagan: Users’ thoughts on the iPhone X vs. iPhone 8

The iPhone X has been with us for a while and now users are starting to develop real opinions. I’ve talked to many users of iPhone X, iPhone 8 and previous iPhones and found their input very enlightening. So, let me share some of...

Secret Region service strengthens AWS, government sector relationship

AWS unveils “Secret Region” cloud service for U.S. Intelligence Community Amazon Web Services (AWS) recently debuted a cloud service for the U.S. Intelligence Community dubbed “Secret Region,” accessible only to those with a secret level classification from the government. With the launch of Secret Region,...

DDoS attacks on the rise: Corero Network Security

Corero Network Security report notes uptick in DDoS attacks Distributed Denial of Service (DDoS) attacks are becoming more sophisticated and common, according to the latest DDoS Trends and Analysis report by Corero Network Security. In particular, Corero found its customers experienced an average of 237...