YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

Oracle execs on IoT revenue opportunities and cybersecurity

Massive IoT means massive cybersecurity implications Support for a massive number of internet of things devices, as well as significantly increased device density, is one of the primary use cases for 5G. While there's considerable consumer interest in IoT devices—think smart watches, home security cameras...

Signaling and network slice-as-a-service mark Oracle 5G strategy

Oracle looking from non-standalone 5G NR to standalone 5G NR Current and near-term standards-based 5G deployments are focused on the non-standalone 5G New Radio specification, but that's just a first step. That will be followed by an upgrade cycle to the standalone 5G NR spec,...

AT&T and Ericsson offer to test enterprise IoT devices for cybersecurity flaws

AT&T and Ericsson are offering to test and validate IoT devices to help safeguard against cybersecurity threats. The pair are offering the service through the CTIA’s new cybersecurity certification programme. Devices will be tested and certified by Ericsson, at its labs. AT&T is making the certification...

10 key private-sector cybersecurity standards

A previous article in this series discussed government efforts for cybersecurity. This article will give a rundown on some of the major standards development organizations (SDOs) in the area of cybersecurity, with appropriate links. It is impossible to include every organization, but these are...

What is the government doing to counter cybercrime?

Countering cybercrime is a daunting challenge, not only because there are so many cybercriminals but also because they are so technically sophisticated. A 2014 ZDNet article stated that organized cybercrime groups have technical capabilities equal to (or in some cases superior to) those of...

Cyber threats to utilities, and what to do about them

There was a time that physical attacks by one country on another occurred only during open war. In the past few decades, however, cyber attacks on critical infrastructure continue to increase in number and sophistication. The main threats come from nation states and criminal...

Cyber threats to industrial control systems

If you want to do real harm to a country attack its infrastructure — utilities, for example — and its economic base — its industry. In the United States both are under constant attack; not with bombs from the air but with cyber warfare....

With AlienVault acquisition complete, AT&T names new head of cybersecurity solutions

Highlights cybersecurity needs of small- and medium-sized businesses AT&T this week completed its acquisition of threat intelligence specialist AlienVault, which the carrier announced back in July. With the deal done, AlienVault CEO Barmak Meftah will retain that role while taking on responsibilities as president of...

Alleged cryptocurrency theft prompts lawsuit against AT&T

In a lawsuit filed Aug. 15 in the U.S. District Court in Los Angeles, cryptocurrency investor Michael Terpin accuses AT&T of fraud, negligence and other actions that allegedly allowed thieves to access Terpin's device and, subsequently, cryptocurrency reportedly valued at $23.8 million. For the...

Does machine learning for cybersecurity live up to the hype?

Trying to keep intruders out of your network is like trying to keep vermin out of a house in a bad neighborhood. The rodents and insects never stop trying to get in, and the best you can do is slow them down, minimize the...

IBM opens four new X-Force Red hacking facilities to take fight to IoT cyber criminals

IBM has announced a new cybersecurity testing facility for its X-Force Red ethical hacking team at its campus in Austin, Texas, alongside three further testing sites, in Atlanta, Georgia, in the US, Hursley, England, in the UK, and Melbourne, in Australia. The network of facilities,...

Virus hits chip manufacturer’s equipment after botched software install

TSMC is major chip supplier for Apple Taiwan Semiconductor Manufacturing Company, a major supplier of the A11 chip Apple uses in its iPhone X, was recently hit by a computer virus that resulted in decreased production based on key fabrication machines being taken offline. According to...

AI and 5G go hand-in-hand for network operations

As network attacks get more sophisticated, AI can help with threat detection As it continues to develop, 5G will become increasingly complex. The need to deploy virtualized, programmable infrastructure becomes more pressing as new bandwidth-consuming enterprise, industrial and consumer applications hit the market. And, in...

UK oversight body expresses security concerns about Huawei equipment

Group can only provide "limited assurance" of security mitigation related to Huawei equipment Chinese telecoms vendor Huawei is facing security-related scrutiny particularly in the United States and Australia. Now, with the release of a report from a U.K. watchdog, concerns around network security seem to...

AT&T VP of Cybersecurity discusses threat intelligence

Threat intelligence a key part of risk management strategy Threat intelligence solutions were a primary motivator of AT&T's acquisition of AlienVault, which is expected to close in Q3 this year. To get a better understanding of the operator's goals with the acquisition, RCR Wireless News posed...

AT&T acquires open-source threat intelligence firm

AT&T expects acquisition of open-source cybersecurity AlienValut specialist later this year As AT&T continues down its network virtualization efforts using the open-source Open Networking Automation Platform (ONAP), the operator has acquired cybersecurity firm AlienVault, which uses open-source software to provide what the companies call "threat...

EC proposes €51.6bn for new industrial transformation tech and infrastructure

The European Commission (EC) has proposed a total budget of €51.5 billion for new technologies and network infrastructure under its next funding cycle, from 2021 to 2027, to drive industrial transformation and technological leadership across the region. As part of two separate proposals, it has...

Verizon expands cybersecurity services

Verizon combines threat data from its network with data breach research, Anomali partnership Verizon is expanding its managed cybersecurity offerings, dipping into threat-related data it collects across its own network to inform "cyber-situational awareness" for its customers. Bryan Sartin, Verizon’s executive director of security professional services,...

IoT market hobbled by complexity, says Arm

The ‘internet of things’ (IoT) market is being undermined by complexity, as well as challenges with security, reckons UK-based micro-processor firm Arm, as it confirmed deeper integration with IBM’s Watson. “The market hasn’t come as far as we’d hoped; it is pretty fragmented – by...

Microsoft intros triple lock to secure IoT devices at the network edge

Microsoft has announced a new platform to secure ‘internet of things’ (IoT) devices. Dubbed Azure Sphere, it layers in three levels of enhanced IoT security, in its chip, operating system (OS) and cloud. Most significantly, Microsoft has introduced a new “cross-over class” of chip, or...

Telecom companies form alliance to bolster cybersecurity

Singtel, SoftBank,Etisalat and Telefónica join forces on cybersecurity Singtel, SoftBank, Etisalat and Telefónica have joined forces in a global telco security alliance. The companies collectively boast over 1.2 billion customers across 60 countries. The alliance’s founding members oversee 22 security operation centers, which employ more than...

FCC committee warns of diameter signaling network vulnerabilities

Diameter signaling has similar vulnerabilities as SS7 Location tracking, interception of voice and text messages, denial of service and account fraud are all potential attack vectors associated with the Signaling System 7 protocol. And those same vulnerabilities can be applied to diameter signaling, according to...

How to improve cybersecurity with machine learning

Leveraging machine learning for cybersecurity Data breaches and cyber attacks have become harder to deter over the last few years. According to Cisco’s 2018 Annual Cybersecurity Report, for example, the expanded volume of both legitimate and malicious encrypted traffic on the web has made it...

VMware acquires E8 Security to boost endpoint management platform

VMware purchases E8 Security VMware announced last week it has acquired California-based cybersecurity startup E8 Security. Financial details of the deal were not disclosed. E8 Security's Fusion Platform leverages machine learning to identify cyber threats. Its purpose is to pinpoint malicious behavior and address vulnerabilities. As part...