Massive IoT means massive cybersecurity implications
Support for a massive number of internet of things devices, as well as significantly increased device density, is one of the primary use cases for 5G. While there's considerable consumer interest in IoT devices—think smart watches, home security cameras...
Oracle looking from non-standalone 5G NR to standalone 5G NR
Current and near-term standards-based 5G deployments are focused on the non-standalone 5G New Radio specification, but that's just a first step. That will be followed by an upgrade cycle to the standalone 5G NR spec,...
AT&T and Ericsson are offering to test and validate IoT devices to help safeguard against cybersecurity threats.
The pair are offering the service through the CTIA’s new cybersecurity certification programme. Devices will be tested and certified by Ericsson, at its labs. AT&T is making the certification...
A previous article in this series discussed government efforts for cybersecurity. This article will give a rundown on some of the major standards development organizations (SDOs) in the area of cybersecurity, with appropriate links. It is impossible to include every organization, but these are...
Countering cybercrime is a daunting challenge, not only because there are so many cybercriminals but also because they are so technically sophisticated. A 2014 ZDNet article stated that organized cybercrime groups have technical capabilities equal to (or in some cases superior to) those of...
There was a time that physical attacks by one country on another occurred only during open war. In the past few decades, however, cyber attacks on critical infrastructure continue to increase in number and sophistication. The main threats come from nation states and criminal...
If you want to do real harm to a country attack its infrastructure — utilities, for example — and its economic base — its industry. In the United States both are under constant attack; not with bombs from the air but with cyber warfare....
Highlights cybersecurity needs of small- and medium-sized businesses
AT&T this week completed its acquisition of threat intelligence specialist AlienVault, which the carrier announced back in July. With the deal done, AlienVault CEO Barmak Meftah will retain that role while taking on responsibilities as president of...
In a lawsuit filed Aug. 15 in the U.S. District Court in Los Angeles, cryptocurrency investor Michael Terpin accuses AT&T of fraud, negligence and other actions that allegedly allowed thieves to access Terpin's device and, subsequently, cryptocurrency reportedly valued at $23.8 million. For the...
Trying to keep intruders out of your network is like trying to keep vermin out of a house in a bad neighborhood. The rodents and insects never stop trying to get in, and the best you can do is slow them down, minimize the...
IBM has announced a new cybersecurity testing facility for its X-Force Red ethical hacking team at its campus in Austin, Texas, alongside three further testing sites, in Atlanta, Georgia, in the US, Hursley, England, in the UK, and Melbourne, in Australia.
The network of facilities,...
TSMC is major chip supplier for Apple
Taiwan Semiconductor Manufacturing Company, a major supplier of the A11 chip Apple uses in its iPhone X, was recently hit by a computer virus that resulted in decreased production based on key fabrication machines being taken offline.
According to...
As network attacks get more sophisticated, AI can help with threat detection
As it continues to develop, 5G will become increasingly complex. The need to deploy virtualized, programmable infrastructure becomes more pressing as new bandwidth-consuming enterprise, industrial and consumer applications hit the market. And, in...
Group can only provide "limited assurance" of security mitigation related to Huawei equipment
Chinese telecoms vendor Huawei is facing security-related scrutiny particularly in the United States and Australia. Now, with the release of a report from a U.K. watchdog, concerns around network security seem to...
Threat intelligence a key part of risk management strategy
Threat intelligence solutions were a primary motivator of AT&T's acquisition of AlienVault, which is expected to close in Q3 this year. To get a better understanding of the operator's goals with the acquisition, RCR Wireless News posed...
AT&T expects acquisition of open-source cybersecurity AlienValut specialist later this year
As AT&T continues down its network virtualization efforts using the open-source Open Networking Automation Platform (ONAP), the operator has acquired cybersecurity firm AlienVault, which uses open-source software to provide what the companies call "threat...
The European Commission (EC) has proposed a total budget of €51.5 billion for new technologies and network infrastructure under its next funding cycle, from 2021 to 2027, to drive industrial transformation and technological leadership across the region.
As part of two separate proposals, it has...
Verizon combines threat data from its network with data breach research, Anomali partnership
Verizon is expanding its managed cybersecurity offerings, dipping into threat-related data it collects across its own network to inform "cyber-situational awareness" for its customers.
Bryan Sartin, Verizon’s executive director of security professional services,...
The ‘internet of things’ (IoT) market is being undermined by complexity, as well as challenges with security, reckons UK-based micro-processor firm Arm, as it confirmed deeper integration with IBM’s Watson.
“The market hasn’t come as far as we’d hoped; it is pretty fragmented – by...
Microsoft has announced a new platform to secure ‘internet of things’ (IoT) devices. Dubbed Azure Sphere, it layers in three levels of enhanced IoT security, in its chip, operating system (OS) and cloud.
Most significantly, Microsoft has introduced a new “cross-over class” of chip, or...
Singtel, SoftBank,Etisalat and Telefónica join forces on cybersecurity
Singtel, SoftBank, Etisalat and Telefónica have joined forces in a global telco security alliance.
The companies collectively boast over 1.2 billion customers across 60 countries. The alliance’s founding members oversee 22 security operation centers, which employ more than...
Diameter signaling has similar vulnerabilities as SS7
Location tracking, interception of voice and text messages, denial of service and account fraud are all potential attack vectors associated with the Signaling System 7 protocol. And those same vulnerabilities can be applied to diameter signaling, according to...
Leveraging machine learning for cybersecurity
Data breaches and cyber attacks have become harder to deter over the last few years. According to Cisco’s 2018 Annual Cybersecurity Report, for example, the expanded volume of both legitimate and malicious encrypted traffic on the web has made it...
VMware purchases E8 Security
VMware announced last week it has acquired California-based cybersecurity startup E8 Security. Financial details of the deal were not disclosed.
E8 Security's Fusion Platform leverages machine learning to identify cyber threats. Its purpose is to pinpoint malicious behavior and address vulnerabilities.
As part...