YOU ARE AT:Security

BROWSING: Security

Businesses prioritize cybersecurity in digital transformation: GSMAi

The GSMAi noted that companies are planning to allocate 9% of their revenue to digital initiatives between 2024 and 2026 Enterprises are increasingly prioritizing cybersecurity and revenue growth over cost-cutting as they accelerate their digital transformation, according to a new report by GSMA Intelligence (GSMAi). The...

Robocalls surged ahead of the 2024 election — Now telcos must meet the moment (Reader Forum)

As the 2024 US Presidential Election approached, political robocalls and robotexts surged. Potential disinformation campaigns, scams and AI-generated deepfakes may hae been increasingly used to attempt to confuse and mislead the public, posing potential risks to voters and further eroding trust in the voice...

Empowering telco security analysts with XDR (Reader Forum)

ABI Research explores how AI and 5G are transforming telco security operations Over the last few years, telco operators have been undergoing a slow but sure metamorphosis from simple connectivity providers to digital technology enablers. In part fueled by 5G network rollouts and the growing...

How to build trustworthiness in 6G

Trustworthiness can be broken into five aspects: security, privacy, reliability, resilience and safety At RCR Wireless' 6G Forum event, NGMN Alliance’s Senior Program Manager Sparsh Singhal defined 6G trustworthiness as confidence in the availability of mechanisms that can mitigate or prevent network security threats. He explained...

Smaller carriers improving signed call traffic, but interconnectivity challenges threaten STIR/SHAKEN (Reader Forum)

Since being introduced via the TRACED Act, STIR/SHAKEN has been a key driver in the telecom industry’s fight against robocalls. The STIR/SHAKEN framework is the telecom industry’s standard call authentication technology. It provides carriers’ subscribers with peace of mind that callers are who they...

Using smartphones to navigate life, Gen Z Is a target for scammers (Reader Forum)

In the rapidly evolving digital landscape, Gen Z has emerged as a prime target for scammers. It’s been reported this generation is more than four times as likely to fall for online scams compared to Baby Boomers. It’s not simply youth that makes them targets....

Perimeter security environments: Challenging—and essential—use cases

Securing a facility that is essential to the public good has never been more important. Energy production and distribution sites, agricultural plants, manufacturing and logistics centers, and public safety facilities are all vital to our collective interests. Unfortunately, these sites are also regularly targeted by...

European Union approves funds for new chip plant in Germany

ESMC is a joint venture between Taiwanese semiconductor manufacturing firm TSMC, Bosch, Infineon and NXP The European Commission (EC) said it has approved a €5 billion ($5.56 billion) German measure to support European Semiconductor Manufacturing Company (ESMC) in its project to construct and operate a...

Addressing network security challenges in 5G Fixed Wireless Access (Reader Forum)

The telecom sector is undergoing a significant transformation due to rapid technological advancements in AI, cloud computing, 5G, evolving customer expectations and a growing demand for seamless connectivity. Fixed wireless access (FWA) is also emerging as a key growth area, particularly in regions where...

Cisco releases Q4 results — Standouts include AI, cybersecurity

Cisco has crossed the $1 billion mark in AI sales, according to CEO Charles Robbins Following reports earlier this week that thousands of Cisco employees will soon be out of a job, the company has released its Q4 and fiscal year (FY) 2024 results, reporting...

UK clears HPE, Juniper $14 billion acquisition deal

Earlier this month, the European Commission approved unconditionally the proposed acquisition of Juniper Networks by HPE The U.K. Competition and Markets Authority (CMA) gave Hewlett Packard Enterprise (HPE) the green light to move forward with the $14 billion acquisition of Juniper Networks, following European Commission...

Half of workers in critical industry hit by cyber attacks – IoT is to blame, says Verizon

More than half of workers in critical industrial sectors have experienced “severe security incidents” that have led to data loss or system downtime, and industrial IoT devices have been blamed. A new poll by US operator Verizon of 600-odd executives in charge of security...

DNB, Cybersecurity Malaysia to boost 5G cybersecurity

DNB and Cybersecurity Malaysia will establish a National 5G Cybersecurity Testing Center Malaysia’s state-run 5G network Digital Nasional Berhad (DNB) has signed a collaboration deal with national cybersecurity specialist center Cybersecurity Malaysia (CSM), with the main aim of to boosting cybersecurity for 5G networks across...

AI risk and reward is driving Industry 4.0 c-suite to distraction, says Cisco study

Cisco has just issued a research study about the state of networking in the broad Industry 4.0 sector, and it is really good – comprehensive, and well communicated. Quite how much of it is genuinely new or surprising is open to debate, but it...

Verizon’s Tracfone fined $16 million over data breaches through APIs

FCC says three customer data breaches involved exploitation of APIs Verizon's TracFone has been fined $16 million as part of a settlement with the Federal Communications Commission related to three breaches involving customer information. All three of the data breaches involved exploitation of application programming interfaces...

BBVA taps Telefónica for cybersecurity AI for global banking operations

Spain-based financial services company BBVA has selected telco-countrymate Telefónica to run artificial intelligence (AI) and process automation into its global cybersecurity operations. It is working with Telefónica Tech, the digital services arm of the Madrid-based telecoms group, to “boost” its cybersecurity regime on a...

Botched software, crappy computers, hybrid clouds – about the global IT outage

Some quick thoughts on the big IT outage today, which grounded planes, trains, banks, hospitals, shops, telcos, and broadcasters around the world. Reports on the radio this morning – when the story was breaking, as I drove the kids to school – led on...

Public Wi-Fi is table stakes, and unsecured Wi-Fi is risky business (Reader Forum)

While public Wi-FI can be very convenient, both for users and providers, it also introduces a number of security challenges. Unsecured or under-secured public Wi-Fi networks can expose users to cyber threats like identity theft, financial fraud and data breaches. Once they are connected, attackers...

AT&T reveals major data hack, says arrest has been made

An AT&T workspace cloud platform provided by third-party vendor Snowflake was 'unlawfully accessed' AT&T has revealed in a new filing that during a six-month period in 2022, it fell prey to a major hack of customer data impacting nearly all of its subscribers. In a...

Telenor creates new company with focus on cybersecurity

Telenor Cyberdefense will offer businesses a Security Operations Centre (SOC) for 24/7 monitoring, prevention, detection and response to all types of cyber threats Nordic operator Telenor announced the creation of a new firm dubbed Telenor Cyberdefense, with the aim of helping Norwegian businesses to deal...

Security among key drivers for 5G private networks adoption

F5 highlighted that adopting a zero-trust architecture is important in a private 5G environment Security is one of the main motivators for enterprises to adopt 5G private networks, according to Richard Lopez, senior strategic architect at F5. “The main motivators for enterprises to adopt 5G private...

Telefónica Tech signs with Microsoft to expand enterprise cybersecurity porftolio

Telefónica Tech has announced a global deal with Microsoft to offer an expanded roster of cybersecurity services to enterprise customers. The deal includes artificial intelligence (AI) solutions related to enterprise cybersecurity, the Spain-based telecoms operator said. It is a global arrangement, pitched to enterprises...

How to secure private 5G networks

Nokia noted that private 5G is well equipped with comprehensive in-built security features mandated by 3GPP The deployment of the edge on-premise is essential to ensure that industrial use cases benefit from private wireless networks performance, according to Stephane Daeuble, head of Enterprise Campus Edge...

FCC designates ‘Royal Tiger’ robocalling ring as a threat to consumers

C-CIST classification identifies an international robocalling group dubbed 'Royal Tiger' as a consumer threat For the first time, the Federal Communications Commission is designating a persistent international calling fraudster ring as a threat to consumers, in an action meant to help telcos target its scam...