Security experts have identified a series of 19 vulnerabilities, given the name Ripple20, in a small software library integrated into “hundreds of millions”, and potentially billions, of IoT devices that have been sold into consumer, enterprise and industrial markets during the past two decades.
Israeli...
We as humans like patterns. We like trends, labels and buzzwords. We like to fit our problems into a category that can be easily solved by one answer and when this can’t be done, the labels by which we categorize our problems become more...
Spain-based telecoms operator Telefónica and Germany-based industrial provider Siemens have announced a deal to offer combined IT / OT cybersecurity for the Industry 4.0 sector in Spain, marrying their respective strengths in IT and OT security.
The Spanish division of Siemens is offering its digital...
Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon's annual Data Breach Investigations Report.
Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches,...
Comprehensive, credible, internal and external testing of all network elements is a critical component of effective, trustworthy cyber security. Independent external testing is also essential to certify compliance with industry standards by equipment vendors, network operators, and service providers.
On May 20, join us for...
Network usage has shifted dramatically since mid-March, when the COVID-19 pandemic began having significant impacts in the U.S. As enterprises and government agencies cope with the impacts of abrupt shifts to large-scale telework, the use of business applications and video conferencing has skyrocketed. VPN...
Cyber threats have no single home country and respect no borders. This makes effective cyber security a responsibility shared by equipment vendors, software developers, users, and all other stakeholders who want, need, and depend upon secure, accessible connectivity.
This webinar will feature two cyber security...
With 5G currently available as a consumer-facing service in key geographies including China, Western Europe and U.S., operators and end users are already exploring what’s next.
As 5G evolves, networks will become cloud-native and distributed, network management and operations will become automated, and capable...
5G is very much an evolving technology and will be for some time as the 3GPP continues to refine the standard and vertical-specific use cases like autonomous manufacturing robotics and remote surgical procedures become a reality. As such, 5G cybersecurity needs to be equally...
Cisco introduced an IoT security architecture that provides enhanced visibility across both IT and IoT environments, and protects processes, the networking company said in a release.
Cisco said its new solutions enable the collection and extraction of data from the IoT edge, so organizations can...
As the underlying technology that comprises 5G has developed, a variety of industry groups, working hand-in-hand with national and international regulatory agencies, have collaborated to ensure global scalability of the next generation of cellular. This unified approach, as with previous generations of technology, is...
I’ve heard this song before…
Around 15 years ago, Apple was engaged in an advertising battle against Microsoft, in which the “cool computer company” poked fun at its competitor’s susceptibility to viruses. Of course, one of the reasons for that weakness, was the sheer size...
Kiva Allgood, head of IoT, Ericsson:
1. The edge is closer than ever
“As enterprises become ‘digitized’ and enable more connected machines, sensors and solutions, computing in the cloud won’t be fast enough to optimize performance in real-time. Enterprises will need computing near the edge. This...
As operators and vendors collaborate to deploy 5G networks, it’s imperative they partner on cybersecurity with both governmental partners and the enterprise verticals poised to benefit from the next generation of cellular technologies.
Through this collaborative process, the entire ecosystem of stakeholders need to...
Mobile broadband has fundamentally changed the way people and businesses go through their day-to-day tasks both personal and professional. Today 5G is available in dozens of countries with operators around the world prepping to launch and further scale the next-generation of wireless.
In addition to...
During 2020, 25% of all breaches will happen outside the network perimeter
WatchGuard has released its 2020 cybersecurity predictions, and according to the report, vulnerabilities in 5G/Wi-Fi handover and the increase of mobile device usage and remote employees will be cause for serious concern in...
Every year, the number of IoT devices expands drastically, a trend that has no real end in sight. For the PropTech industry, there is a great deal of concern around how to plan projects that can accommodate and secure all of the elements of...
According to?Himanshu Khurana, CTO of Honeywell Building Solutions, while the term ?smart building? might be used by some verticals and not others, various industries and environments, including hospitality, airports and hospitals are all showing increased interest in establishing smarter ecosystems.
?The stakeholders care about the...
ZTE is getting ready for security assessments of its 5G products and solutions in the vendor’s cybersecurity lab in Brussels, Belgium, ZTE’s Chief Security Officer Zhong Hong told RCR Wireless News.
The announcement coincides with a recent report published by the European Commission (EC), in...
Last week I flew to Washington D.C. to meet with Huawei. They held a small gathering of key wireless and industry analysts, social media influencers and media. I think the purpose was to help the USA to get to know Huawei better. I also...
Nearly 4 in 10 smart building surveyed have been affected by a malicious cyberattack, according to report
Capable of near real-time data transfer speeds and reduced latency, 5G is expected to facilitate more and better IoT applications for intelligent building technologies over the next few...
Nowadays, security and privacy are on everybody’s mind. Hardly a day goes by without the news of security breaches at major institutions. Most of the time, the reporting is focused on the cloud or network infrastructure, hardly ever on devices. However, when it comes...
In my previous articles here, and here, I explained the rationale for increased focus on device security and its challenges. The threats are more acute, especially from unknown foreign vendors offering predatory pricing. After reading the articles, a few people questioned me about the...
The Huawei network security panel highlighted equipment verification, operation transparency and global standards
In what appeared to be a direct response to the U.S.’ continued suspicion of Huawei Technologies and its potential threat to U.S. network security, the Chinese equipment vendor sponsored a seminar at...