EY will be the quantum secured network’s first commercial customer and will use it to connect two of its sites in London
Yesterday, BT and Toshiba announced the launch trial of what they claimed to be the world’s first commercial quantum secured metro network. Connecting...
What is the Open Systems Interconnection model?
The Open Systems Interconnection reference model was developed by the International Organization for Standardization (ISO) to serve as a conceptual framework for understanding how data is transferred between two endpoints in a network. Specifically, it categorizes the communications...
Equinix announces new key management and encryption service
Data center company Equinix announced the general availability of a new global key management and encryption Software-as-a-Service (SaaS) called SmartKey.
The purpose of SmartKey is to better protect data across multi-cloud environments using encryption key management. In particular,...
Different WAN technologies
Software-defined networking (SDN) has played a major role in reshaping wide-area networks (WANs). So much so that other WAN technologies, such virtual WAN and hybrid WAN, are often mistakenly conflated with SD-WAN. While virtual and hybrid WAN technologies share similar goals with...
SonicWall announces 2018 Cyber Threat Report
Internet security company SonicWall recently announced its 2018 Cyber Threat Report, which recorded approximately 9.32 billion malware attacks and over 12,500 new common vulnerabilities and exposures (CVE) in 2017.
The report sources information from over one million security sensors in...
Data center security tips
Data breaches have become more common as more companies use the cloud to conduct day-to-day business operations. Just last year, for example, one of the country’s biggest credit report companies, Equifax, announced the personal information of potentially 143 million U.S. citizens...
Cisco releases 2018 Annual Cybersecurity Report
Cyber criminals are increasingly using encryption to evade detection, while security professionals are becoming more reliant on automation, machine learning and artificial intelligence (A.I.).
That is at least the conclusion of Cisco’s recently published 2018 Annual Cybersecurity Report, which involved...
Securing open distributed architectures
Service providers have gravitated toward open distributed architectures over the past few years with the rise of network functions virtualization (NFV), software-defined networking (SDN), virtual machines, containers and other technologies. Although network operators have been eager to embrace open distributed architectures...
IBM Corp. debuted Monday the encryption capabilities of its new z14 mainframe, otherwise known as IBM Z, which is focused on combating the growing threat of data breaches.
The number of data breaches within the U.S. is on the rise. IBM purports universal encryption --...
The age of encryption is upon us. Data gathered from mobile operator networks around the world reveal that between 50% and 65% of all mobile data traffic is now encrypted. This is up from a level of only 10-20% in 2013. Right under our...
Editor’s Note: RCR Wireless News goes all in for “Throwback Thursdays,” tapping into our archives to resuscitate the top headlines from the past. Fire up the time machine, put on the sepia-tinted shades, set the date for #TBT and enjoy the memories!
We start...
KPN's CIO Jaya Baloo wants everyone to “live long, laugh a lot and encrypt everything.”
Speaking at the International NCSC One Conference in The Hague, Baloo said encryption was essential for protecting the freedom of expression.
Baloo also praised the Blackphone, a secure smartphone designed by Silent Circle that...
This site uses cookies to improve and personalize your experience and to display advertisements. This site may also include cookies from third parties. By using this site you consent to the use of cookies.Accept