Telenor Cyberdefense will offer businesses a Security Operations Centre (SOC) for 24/7 monitoring, prevention, detection and response to all types of cyber threats
Nordic operator Telenor announced the creation of a new firm dubbed Telenor Cyberdefense, with the aim of helping Norwegian businesses to deal...
Vodafone partnered with tech research center i2CAT Foundation for this development
Vodafone and tech research center i2CAT Foundation announced that they will take advantage of the improved automation offered by Open-RAN to jointly build a multi-vendor management system to fix faults and respond to cyber...
Telefonica Tech noted its new cyber-intelligence service is part of the NextDefense managed services
Telefónica Tech, which is a unit of Spanish carrier Telefonica, has launched a comprehensive cyber intelligence service for large enterprises, the company said in a release.
Telefónica Tech’s new service provides guidance...
Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon's annual Data Breach Investigations Report.
Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches,...
More than a dozen global mobile network providers have been attacked in a successful effort to obtain information on specific subscribers, including call detail records and geolocation information, according to a cybersecurity firm and published reports. Security firm Cybereason, which detailed the mechanisms behind...
The two companies said they will work together to influence best practices for retailers to minimize risk of cybersecurity threats
U.S. provider internet of things provider Pepper IoT has inked a long-term deal with Swiss digital security firm Kudelski Group to protect IoT service providers...
Nokia announces Enterprise Session Border Controller
Nokia introduced a new cloud-native Enterprise Session Border Controller (eSBC), which the company said provides high-quality IP voice and video services.
Nokia's eSBC is intended to mitigate cyber attacks, optimize the use of IP bandwidth for communications and thwart unauthorized...
What are security holes?
Applying patches to operating systems is pivotal to network security. A software vulnerability is typically a security hole discovered in an operating system or software program, which hackers target with a specific code clothed as malware. In the interest of taking...
The challenge of NFV and SDN security vulnerabilities
Telecommunication operators are gung-ho about network functions virtualization (NFV) and software-defined networking (SDN). The former involves decoupling software from hardware, whereas the latter involves a central control plane that manages network behavior. Although both technologies provide several...
Smart cities are paraded as technological utopias where everything, from traffic management to air quality control, is automated. Although the booming internet of things (IoT) offers a wealth of applications to improve city services, its success is not guaranteed. One of the great worries...
This site uses cookies to improve and personalize your experience and to display advertisements. This site may also include cookies from third parties. By using this site you consent to the use of cookies.Accept