YOU ARE AT:Security

BROWSING: Security

2024 network predictions: It’s all about the economics (Reader Forum)

The world is in a perpetual upgrade cycle driven by advances in all areas of technology. Customers must understand their needs if they are to optimize the cost and performance of their networks when choosing when and what to purchase. The wireless industry faces...

Replacing VPNs — Why it’s time to trust zero-trust to secure IoT and beyond (Reader Forum)

Lateral movement — it’s one of bad actors' favorite methods for finding high value targets they can exploit, once they are in your network. Tracking your servers, reading your mail, eating your snacks — pretty much causing havoc that could have very significant consequences.  I...

AT&T to create cybersecurity joint venture

AT&T will retain an ownership stake and board representation in the new entity AT&T announced an agreement to create a standalone managed cybersecurity services business. In a release, the telco also announced a capital investment in that business from WillJam Ventures, a Chicago-based investor with cybersecurity...

New processes, new threats and new security challenges in industrial 5G

Security threats for companies operating in different verticals increase when a new technology is integrated into a legacy system with increase of connected devices Changes in processes and the conversion of IT and OT teams create new challenges and security vulnerabilities for companies in different...

Palo Alto Networks makes two security-related acquisitions

Palo Alto Networks recently entered into definite agreements to Acquire Talon Cyber Security and Dig Security Cybersecurity specialist Palo Alto Networks is expanding its security capabilities through the recent acquisition of two firms. In a release, the firm said that it has entered into a definitive...

Costa Rica says Chinese vendors pose cybersecurity risks

The science, technology, and telecommunications minister of Costa Rica stated that Chinese vendors represented a security threat to the emerging digital network Costa Rican government officials have raised concerns about potential cybersecurity threats posed by Chinese vendors in the development of 5G networks in the...

Reviving deep packet inspection: The journey from antiquated hardware to the cloud (Reader Forum)

In the dynamic world of network traffic management, the concept of Deep Packet Inspection (DPI) has been a subject of intense debate in recent years. As concerns around data privacy and cybercrime have grown, the use of encryption technologies to secure data across public...

Cisco to buy Splunk in its largest acquisition to date

Cisco will buy cybersecurity firm Splunk for $28 billion In its largest acquisition to date, Cisco has entered an agreement to buy cybersecurity firm Splunk for $28 billion as part of a larger effort to increase recurring software revenue to its bottom line. Cisco...

KT proposes telecom reconstruction efforts in Ukraine

KT proposed enhancing national security through quantum encryption solutions Korea’s KT presented the Ukraine government with insights into how the country can improve its telecommunication infrastructure, including ways to manage the networks more efficiently. The presentation, titled "ICT Partner for Ukraine," was led by Moon Sung-uk,...

Huawei files lawsuit against Portugal’s 5G ban: Report

A decision by the Portuguese government is currently effectively banning local telcos from implement 5G gear from Chinese vendor Huawei The Portuguese unit of Chinese vendor Huawei has filed a lawsuit against a previous decision made by the country’s security assessment commission, which effectively bars...

Ericsson deploys 5G test network infra for German agency BSI

Ericsson said the base system includes components for a cloud-native 5G core network, as well as radio standards covering both 5G and 4G functions Swedish vendor Ericsson said it is supplying the German Federal Office for Information Security (BSI) with a full-scale 5G test network...

Deutsche Telekom opens quantum lab

Deutsche Telekom said the new facility is located at its T-Labs in Berlin German operator Deutsche Telekom said it has inaugurated a quantum lab at its T-Labs location in Berlin, Germany. In a release, the European carrier said that the new facility is dedicated to quantum...

National Grid to set ‘honeypots’ to trap hackers – amid rising risk from digitisation

National Grid, the UK electricity and gas utility company, also operating in New York and Massachusetts, is advertising a million-pound vacancy for a cyber specialist to set ‘honeypots’ in its network systems to wrongfoot hackers and misdirect incoming attacks on critical energy infrastructure. The...

SK Telecom seeks standards for quantum-safe communication

SK Telecom noted it will be leading efforts to develop standards for key management of hybrid approaches with quantum key distribution (QKD) and post-quantum cryptography (PQC) Korean operator SK Telecom said it will promote the development of standards for quantum-safe communications at the International Telecommunication...

Zayo: DDoS attacks up 200%, driven in part by automation

Hackers are relying on AI and automation to fuel cyber attacks, Zayo says The first half of 2023 saw 200% more dedicated denial of service attacks than the entire year of 2022, according to new data from network infrastructure provider Zayo, with telecommunications companies as...

BT, NATS partner on flight safety in UK

BT will provide NATS with network architecture and cybersecurity services BT has announced a seven-year contract with NATS — formerly known as National Air Traffic Services — to provide network architecture and cybersecurity services with a focus on improving safety of U.K. flight operations. NATS...

Schneider unveils managed security service, warns of rising OT risk from 5G-IoT

On the back of its launch of a new managed security services (MSS) portfolio, France-based energy management and automation specialist Schneider Electric has warned that new cellular-based operational technology (OT) solutions – advancing notably with the introduction of private 5G systems, flanked also by...

The future of IoT-based security to protect lives (Reader Forum)

Property crime is the most common type of criminality in the U.S. There are 2.5 million burglaries annually in the U.S., 66% of which are home invasions, while the other 34% affect small businesses. Yet only 25% of Americans have a home security system...

Well, technically… compliance does not equal security: Treasure Data’s Aysha Khan (Ep. 104)

This week's guest, Aysha Khan, the CIO/CISO at Treasure Data, discusses the role of IT in digital transformation, how the COVID-19 pandemic and the shift to remote work impacted this transformation and what enterprises are looking for when it comes to data security. https://soundcloud.com/rcrwirelessnews/well-technically-compliance-does-not-equal-security-ep-104?si=fec1a60434524a8bb493f54716f1421a&utm_source=clipboard&utm_medium=text&utm_campaign=social_sharing

How zero-touch partner onboarding can help telecom increase enterprise 5G revenues (Reader Forum)

The era of 5G is now upon us. While 5G penetration will depend largely on regional rollouts, the global average is set to grow from 13% in 2022 to more than 60% in 2030. It presents telecommunications companies with an unprecedented opportunity for growth...

Australia moves forward to set 5G security lab

The Department of Home Affairs has launched a tender process to select an operator for the 5G lab The government of Australia is moving ahead with its plans to set up a lab with the main aim of checking the interoperability and security of 5G...

Japanese port hit by Russian ransomware attack

The ransomware attack, allegedly launched by Russia, targeted a container terminal at the Port of Nagoya in Aichi Prefecture Japan’s biggest maritime port suffered a ransomware attack that significantly disrupted cargo operations. The attack, allegedly launched by Russia, hit a container terminal at the Port...

How concerned should carriers be about 5G reliability and security? (Reader Forum)

Open RAN and vRAN — along with multi-access computing (MEC) — are enabling the creation of highly-distributed 5G networks to support a plethora of new applications that require ultra-low latency, very high bandwidth, ultra-reliability and greater device density. Unfortunately, history shows us that even the...

Kagan: Betacom AirGap Protection strengthens private network security

Betacom is introducing AirGap Protection. This is a network architecture focused on enhancing cybersecurity for its flagship offering called Betacom 5G as a Service or 5GaaS. This is what enterprise customers both want and need.  One of the most rapidly growing segments in the wireless...