YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

Allot: Users aware of mobile malware threats, but slow to adopt protections

Mobile users are aware of online threats and a significant number have experienced a mobile malware attack in the past 12 months, according to a new survey by Allot Communications. Allot found that 68% of surveyed mobile users are aware of malware and within that 68%,...

IoT Cybersecurity Alliance to focus on security challenges

AT&T, IBM and Nokia part of founding group of companies targeting IoT security. AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic formed the IoT Cybersecurity Alliance, with a focus on helping enterprises tackle security challenges tied to the internet of things. AT&T...

2017 Predictions: Top ransomware threats businesses can expect in 2017

Ransomware made headlines in 2016, but is expected to be a larger issue in 2017. Editor’s Note: With 2017 now upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they expect to see in...

Reader Forum: Recent attacks on RDP – what you should know

A recent rash of malware attacks on Microsoft’s RDP calls into question current thinking in terms of battling Trojan attacks. Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something...

2017 Predictions: Convergence of mobile, payments and security in 2017

HPE sees growing security concerns altering how organizations attempt to oversee their operations across mobile networks. Editor’s Note: With 2017 now upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they expect to see...

Iris identity authentication is coming to the internet of things

Earlier this month, EyeLock, a company focused on iris-based identity authentication solutions, announced the introduction of three reference designs architected for high volume OEM integration. EyeLock's new product was designed to fill the rapidly increasing demand for iris authentication solutions for "internet of things" devices and applications...

2017 Predictions: 10 Cybersecurity challenges from IoT, DDoS, autos and more

Cybersecurity is set to become more challenging in 2017, with IoT, DDoS, predictive analytics and automobiles just some of the segments. Editor’s Note: With 2017 virtually upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what...

Reality Check: The evolution of biometrics for mobile devices

The use of biometrics for security by the mobile industry is growing, but partnerships are key to ensure continued development and deployment. In today’s digital world, we rely on our mobile devices to save copious amounts of personal information. With the emergence of...

2017 Predictions: Mobile security – 2016 and beyond

Mobile security does have a leg up on its desktop counterpart, though greater cooperation is needed. Editor’s Note: With 2017 virtually upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in...

Meet BlackBerry Secure, a mobile-security platform for IoT

Last week, BlackBerry unveiled its mobile-native approach to security with the launch of a platform designed for the industrial "internet of things." The BlackBerry Secure platform is a product of the company’s individual security offerings combined into a single suite. The cloud-enabled approach was...

Reader Forum: Is love of sports increasing mobile subscribers’ risks of malware attacks?

Mobile operators should look to sports fans as a way to educate them on potential security threats and the opportunity to sell new services. Mobile has changed the way people experience sporting events as fans shift to the digital arena to...

Reality Check: DDoS attacks turning net neutrality into a principle of bias

Telecom operators are in a prime position to use their network insights and net neutrality legislation to counter DDoS attacks and target new business opportunities. Net neutrality is at the core of the internet’s guiding principles. The idea that internet...

Editorial Webinar: Securing mobility and cloud in the age of analytics

Consumer demand for mobile connectivity and cloud-based platforms has resulted in mobile networks transmitting more data than ever, which puts carriers in a prime spot to use analytics in order to glean insight into what is actually moving across their networks. However, growing demand...

Reader Forum: For CSPs IoT, NFV and SDN is era of growing opportunity and risks

As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...

Reader Forum: Cybersecurity concerns in the world of building automation

Does continued growth of the IoT open up cybersecurity concerns for building automation? Every day when we arrive at the office we take some things for granted – the lights will be on, the heat or air conditioning will be working and the building entry...

Bosch launches connected scooter sharing service in Berlin

Industrial group Bosch is entering the consumer mobility sector with the launch of a connected scooter sharing service in Berlin. Coup is the name of a new connected scooter sharing service launched in Berlin by industrial group Bosch, in partnership with BCG Digital Ventures, the...

Rio Olympics: Cybersecurity a high priority

Security is one of the major concerns surrounding the Rio 2016 Olympic and Paralympic Games, and not only physical security. Information and communications technology providers interviewed by RCR Wireless News for a special Olympics series (check all stories here) put cybersecurity at the top of their list...

Reader Forum: 3 tips to prepare for the Rio ‘data’ Olympics

Baidu provides 3 tips for operators looking to support a surge in data connected with the upcoming 2016 Summer Olympic Games in Brazil With spectators streaming the events worldwide, athletes posting pregame rituals on social media and fans taking selfies in the stands, smartphone activity...

Cisco agrees to acquire cloud security firm for $293M

In a move intended to bolster its end-to-end cloud security portfolio, Cisco this week agreed to acquire Massachusetts-based security startup CloudLock for $293 million. CloudLock uses an API-based approach to provide cloud access security broker tech geared toward enterprise-grade security and analytics related to cloud...

Energy vs. security – the IoT tradeoff

Enterprises harnessing the IoT will need to strike a careful balance between security and power consumption Amid all the buzz about the arrival of low power wide area connectivity and "internet of things" devices that can function for a decade on a single battery charge, there is...

Energy versus security–the IoT tradeoff

Enterprises harnessing the IoT will need to strike a careful balance between security and power consumption Amid all the buzz about the arrival of low power wide area (LPWA) connectivity and IoT devices that can function for a decade on a single battery charge, there...

Apple vs. FBI heats up ahead of March 22 court date

Much broader questions about security and privacy at stake, Apple argues; Woz weighs in Apple and the FBI, engaged in an increasingly heated legal exchange over an alleged terrorist’s iPhone that has also sparked a national discussion about digital security, are set to meet in...

Vodafone launches new business line for enterprise security

Enterprise focus on cybersecurity technologies Vodafone launched its Enterprise Security Services platform, which is designed to provide enterprise customers with cybersecurity technologies and support. The company said the VESS line will bring together the group's current portfolio of security products. The new business line is...

Reader Forum: How to control data access on mobile devices

Graphite Software looks at ways to control data access on mobile devices for children Poor, beleaguered parents these days. Not only do they have to wage daily battles with their kids about too much “screen time” at home, they have to track the security, privacy...