YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

Potentially billions of IoT devices at risk from Ripple20 attacks – major brands are flagged

Security experts have identified a series of 19 vulnerabilities, given the name Ripple20, in a small software library integrated into “hundreds of millions”, and potentially billions, of IoT devices that have been sold into consumer, enterprise and industrial markets during the past two decades. Israeli...

Functionality is the key to understanding IoT security needs (Reader Forum)

We as humans like patterns. We like trends, labels and buzzwords. We like to fit our problems into a category that can be easily solved by one answer and when this can’t be done, the labels by which we categorize our problems become more...

Telefónica and Siemens combine on Industry 4.0 cybersecurity in Spain

Spain-based telecoms operator Telefónica and Germany-based industrial provider Siemens have announced a deal to offer combined IT / OT cybersecurity for the Industry 4.0 sector in Spain, marrying their respective strengths in IT and OT security. The Spanish division of Siemens is offering its digital...

Attacks on web applications rise as data moves to the cloud, Verizon finds

Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon's annual Data Breach Investigations Report. Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches,...

Huawei Webinar: Cybersecurity Standards and Testing in Europe

Comprehensive, credible, internal and external testing of all network elements is a critical component of effective, trustworthy cyber security. Independent external testing is also essential to certify compliance with industry standards by equipment vendors, network operators, and service providers. On May 20, join us for...

‘Working through the new realities’: Netscout on network security and telework

  Network usage has shifted dramatically since mid-March, when the COVID-19 pandemic began having significant impacts in the U.S. As enterprises and government agencies cope with the impacts of abrupt shifts to large-scale telework, the use of business applications and video conferencing has skyrocketed. VPN...

Huawei Webinar: 5G Security – A Shared Responsibility

  Cyber threats have no single home country and respect no borders. This makes effective cyber security a responsibility shared by equipment vendors, software developers, users, and all other stakeholders who want, need, and depend upon secure, accessible connectivity. This webinar will feature two cyber security...

Top 3 considerations for 5G cybersecurity

  With 5G currently available as a consumer-facing service in key geographies including China, Western Europe and U.S., operators and end users are already exploring what’s next. As 5G evolves, networks will become cloud-native and distributed, network management and operations will become automated, and capable...

5G cybersecurity: 3GPP vs. NIST—understanding the standards

  5G is very much an evolving technology and will be for some time as the 3GPP continues to refine the standard and vertical-specific use cases like autonomous manufacturing robotics and remote surgical procedures become a reality. As such, 5G cybersecurity needs to be equally...

Cisco intros new IoT security architecture

  Cisco introduced an IoT security architecture that provides enhanced visibility across both IT and IoT environments, and protects processes, the networking company said in a release. Cisco said its new solutions enable the collection and extraction of data from the IoT edge, so organizations can...

How to develop 5G security standards at a global scale

  As the underlying technology that comprises 5G has developed, a variety of industry groups, working hand-in-hand with national and international regulatory agencies, have collaborated to ensure global scalability of the next generation of cellular. This unified approach, as with previous generations of technology, is...

On Android malware (Reader Forum)

I’ve heard this song before… Around 15 years ago, Apple was engaged in an advertising battle against Microsoft, in which the “cool computer company” poked fun at its competitor’s susceptibility to viruses. Of course, one of the reasons for that weakness, was the sheer size...

Ericsson on 2020: ‘IoT at the edge is a boon for telcos’ – 5 IoT predictions

Kiva Allgood, head of IoT, Ericsson: 1. The edge is closer than ever “As enterprises become ‘digitized’ and enable more connected machines, sensors and solutions, computing in the cloud won’t be fast enough to optimize performance in real-time. Enterprises will need computing near the edge. This...

What is threat modeling for 5G cybersecurity?

As operators and vendors collaborate to deploy 5G networks, it’s imperative they partner on cybersecurity with both governmental partners and the enterprise verticals poised to benefit from the next generation of cellular technologies. Through this collaborative process, the entire ecosystem of stakeholders need to...

Security vs. Privacy: What’s the distinction in the 5G era?

  Mobile broadband has fundamentally changed the way people and businesses go through their day-to-day tasks both personal and professional. Today 5G is available in dozens of countries with operators around the world prepping to launch and further scale the next-generation of wireless.  In addition to...

Increased mobile usage, 5G/Wi-Fi handoff big security risks in 2020: Report

During 2020, 25% of all breaches will happen outside the network perimeter WatchGuard has released its 2020 cybersecurity predictions, and according to the report, vulnerabilities in 5G/Wi-Fi handover and the increase of mobile device usage and remote employees will be cause for serious concern in...

Attack surface area, data privacy challenges in PropTech

Every year, the number of IoT devices expands drastically, a trend that has no real end in sight. For the PropTech industry, there is a great deal of concern around how to plan projects that can accommodate and secure all of the elements of...

Variety of verticals are interested in smarter ecosystems

According to?Himanshu Khurana, CTO of Honeywell Building Solutions, while the term ?smart building? might be used by some verticals and not others, various industries and environments, including hospitality, airports and hospitals are all showing increased interest in establishing smarter ecosystems. ?The stakeholders care about the...

ZTE preparing for 5G security assessments in Brussels lab: Executive

  ZTE is getting ready for security assessments of its 5G products and solutions in the vendor’s cybersecurity lab in Brussels, Belgium, ZTE’s Chief Security Officer Zhong Hong told RCR Wireless News. The announcement coincides with a recent report published by the European Commission (EC), in...

Kagan: Getting to know Huawei a little better

Last week I flew to Washington D.C. to meet with Huawei. They held a small gathering of key wireless and industry analysts, social media influencers and media. I think the purpose was to help the USA to get to know Huawei better. I also...

As the smart building market grows, so do the security risks

Nearly 4 in 10 smart building surveyed have been affected by a malicious cyberattack, according to report Capable of near real-time data transfer speeds and reduced latency, 5G is expected to facilitate more and better IoT applications for intelligent building technologies over the next few...

Cellular IoT device security–What challenges does its unique ecosystem pose? (Analyst Angle)

Nowadays, security and privacy are on everybody’s mind. Hardly a day goes by without the news of security breaches at major institutions. Most of the time, the reporting is focused on the cloud or network infrastructure, hardly ever on devices. However, when it comes...

Cellular IoT device security–Why the right vendor strategy is important (Analyst Angle)

In my previous articles here, and here, I explained the rationale for increased focus on device security and its challenges. The threats are more acute, especially from unknown foreign vendors offering predatory pricing. After reading the articles, a few people questioned me about the...

Huawei: Network security requires carrier, vendor and government collaboration

The Huawei network security panel highlighted equipment verification, operation transparency and global standards In what appeared to be a direct response to the U.S.’ continued suspicion of Huawei Technologies and its potential threat to U.S. network security, the Chinese equipment vendor sponsored a seminar at...