YOU ARE AT:Security

BROWSING: Security

Editorial Report: Fighting the newest breed of DDoS attacks on data centers

Over the last few years, the threat posed by Distribute Denial of Service (DDoS) attacks has increased at an alarming pace. The frequency, magnitude and sophistication of DDoS attacks has grown as botnets and automated attack tools are readily available to cyber criminals. Today,...

New cybersecurity strategy must stress accountability (Reader Forum)

Rampant malicious activity in cyberspace hurts individuals, companies, and government agencies, while threatening US national security. The expected release of a new National Cybersecurity Strategy by the Biden Administration is an occasion for us to learn lessons from past efforts to reduce cyber risk,...

Singtel unveils 5G security-as-a-slice offering in Singapore

Singtel said the new capability identifies and blocks cyber threats at the network level thus preventing them from reaching the network’s users Singapore telecommunications operator Singtel unveiled its new 5G security-as-a-slice (SecaaS) offering, the telco said in a release. The new capability identifies and blocks cyber...

What is a protocol DDoS attack?

Protocol DDoS attack success is measured not by their size but rather their frequency and persistence Distributed denial-of-service (DDoS) attacks temporarily or indefinitely disrupt services of a host connected to a network to render an entire network or website unavailable. There are three attacks in this...

Application layer DDoS attacks: What is a DNS flood?

The DNS layer is considered the 'phonebook' of the internet During an application or Layer 7 distributed denial-of-service (DDoS) attack, a bad actor or actors exploit weaknesses in the layer of a website that interfaces between human input and the site’s technical backend. In Layer...

Application layer DDoS attacks: What is an HTTP(S) flood?

HTTP flood is the most common type of application layer DDoS attacks Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. There are...

DDoS trends: What are multi-vector attacks?

Comcast Business says it mitigated 24,845 multi-vector DDoS attacks in 2021 Distributed denial-of-service (DDoS) DDoS attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. While larger-scale...

DDoS trends: Volumetric attacks are on the rise

AT&T: 'Volumetric attacks could hit new peaks' Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. DDoS attacks typically target edge network devices...

ZTE’s 5G NR kit gets security certification in Germany

ZTE said its 5G new radio (NR) gNodeB product has complied with the security requirements of Germany Chinese vendor ZTE said its 5G New Radio (NR) gNodeB product has been approved under Germany’s Federal Office for Information Security (BSI)’s NESAS (network equipment security assurance scheme)...

Chinese balloon equipped to collect communications information: State Department

The high-altitude Chinese balloon that traveled over the United States in the past week was equipped to "collect and geolocate" communications signals, according to the U.S. Department of State and published reports. Chinese officials have claimed that the balloon was a "civilian airship" used for...

Cisco closes IT/OT divide with new cloud tools for remote IoT management, security

Cisco has introduced a number of new cloud services in its IoT operations dashboard to increase industrial asset visibility and manage assets remotely and securely. At its annual Cisco Live event in Amsterdam, the firm said it had focused on ways to bridge the...

The role of wireless technology and installation for network security (Reader Forum)

Wireless technology has revolutionized the way businesses operate, connecting employees and devices seamlessly. However, with the increasing use of wireless technology comes the need for proper installation and maintenance to ensure network security. Whether you're a business owner or a corporate IT professional, understanding...

AT&T on 2023: Getting serious about cybersecurity at the edge

Cybersecurity continues its evolution and organizations are focused on it more holistically, as part of business outcomes rather than as component parts, according to Theresa Lanowitz of AT&T. Lanowitz, who is the head of evangelism for AT&T Business' cybersecurity segment, draws on insights gathered...

NVIDIA eBook: The AI-Powered Telco

Leaders in every industry are turning to AI to transform their businesses. For the Telecommunications industry, AI delivers value through the terabytes of data collected every day—from network elements to customer interactions—and through the resulting insights related to managing increased network demand, combating cyberthreats, optimizing...

T-Mobile: API was used to access customer account information

T-Mobile US has suffered another data breach, with the company disclosing that a single Application Programming Interface (API) was used to "obtain limited types of information" on some of its customers. T-Mo said it was in the process of informing those customers, and that...

Canada 5G consortium to focus on securing slices

The consortium will develop are artificial intelligence systems to detect a range of cyberattacks on 5G network slices as they happen The University of Waterloo announced a "5G and beyond" mobile network technology consortium with the aim of developing secure 5G network slices and improving...

Trend Micro unveils new subsidiary for 5G cybersecurity

Trend Micro said that organizations need to integrate resources to combat emerging threats in the private 5G networks field more effectively Trend Micro has established CTOne, which is a new subsidiary of the company that will focus on advancing 5G network security, the company said...

BT makes an Industry 4.0 sandwich – from a fortified private 5G loaf

As promised and previewed last week, here is a full transcript of the interview with Marc Overton, managing director of BT’s industrial go-to-market business Division X – from a conversation a couple of months back, at the UK operator’s annual Robotics Festival at its...

Cyber risk doubles in smart manufacturing as IoT jumps 53 percent per year

Risk of intellectual property (IP) theft, including of industrial trade secrets, is rising fast as manufacturing companies connect private equipment and processes. Analyst house ABI Research has put a figure on both the rate of IP risk and rate of IoT connectivity, forecasting that...

‘That’s the fun part’ – how to scale private 5G (by the only enterprise that knows)

Want to know how to scale private 5G across manufacturing plants and manufacturing applications? Well, European aviation and aerospace manufacturer Airbus knows how. Of course, if you have followed the Airbus story in these pages, or caught its feature presentations and panel discussions at...

Nokia gets private 5G ticket on Paris Express – four lines, 68 stations, 200km of track

The Société du Grand Paris (SGP), the state owned industrial company responsible for the Grand Paris Express metro project, has appointed Nokia to deploy a private 5G macro network across four new lines and 68 new stations in the French capital, covering 200 kilometres...

Cradlepoint locks down wireless WANs with Zero Trust Network Access

ZTNA joins Secure Connect and SD-WAN features, available through Cradlepoint’s NetCloud Exchange Wireless Wide Area Network (WWAN) solution provider Cradlepoint on Wednesday announced the addition of Zero Trust Network Access (ZTNA) to its NetCloud Exchange (NCX) suite. This marks the third cybersecurity enhancement to NCX,...

Betacom strikes deal with Qualcomm on private LTE/5G design and management

Network design and services firm Betacom has struck a channel sales deal (“integrated delivery model”) with Qualcomm whereby enterprise customers in the Industry 4.0 space will be able to link Betacom’s private 5G network design and management service with Qualcomm’s RAN automation and management...

Fujitsu tests private 5G for equipment inspection, remote recovery at data centres

Japanese IT firm Fujitsu is to start testing private 5G for equipment inspection at its major data centre in Yokohama, in the Kanagawa prefecture, as a springboard to drive “operational resilience and process automation” in the broader data centre market. The Fujitsu project, to...