Trustworthiness can be broken into five aspects: security, privacy, reliability, resilience and safety
At RCR Wireless' 6G Forum event, NGMN Alliance’s Senior Program Manager Sparsh Singhal defined 6G trustworthiness as confidence in the availability of mechanisms that can mitigate or prevent network security threats. He explained...
The telecom sector is undergoing a significant transformation due to rapid technological advancements in AI, cloud computing, 5G, evolving customer expectations and a growing demand for seamless connectivity. Fixed wireless access (FWA) is also emerging as a key growth area, particularly in regions where...
Technology advancement means both unprecedented opportunities and significant security challenges
The digital era is hurtling towards a hyper-connected future fueled by advancements like 5G and the looming promise of 6G. While these next-generation networks unlock a treasure trove of possibilities – from the ubiquitous Internet...
Betacom is introducing AirGap Protection. This is a network architecture focused on enhancing cybersecurity for its flagship offering called Betacom 5G as a Service or 5GaaS. This is what enterprise customers both want and need.Â
One of the most rapidly growing segments in the wireless...
Siemens said the Verizon solution is designed to meet the requirements of its Zero Trust ideology of 'never trust, but always verify'
Verizon Business this week announced that it is providing Siemens with Zero Trust network capabilities. The deployment will take place at the company’s...
The company’s security products will protect Telus’s 5G core, internet perimeter and IoT deployments
Palo Alto Networks announced Wednesday that Canadian telco Telus has selected the company to secure its 5G network. Telus will use Palo Alto’s hardware and software firewalls to protect network interfaces...
DDoS attacks are growing faster than any other type of internet traffic, says the director of product marketing at Nokia
A week or so after announcing its fifth generation of routing silicon, dubbed FP5, Nokia spoke with RCR Wireless News in more detail about the...
C Spire's Chief Information Security Officer: 'Security needs to be aware of where the business is going'
For a long time, increasing network availability and speed has dominated the rural broadband conversation; those aspects continue to be part of the ongoing debate around the pending...
The mechanisms of cyber attacks in 2020 were not new -- phishing, ransomware for financial gain and supply chain attacks were the primary trends of concern, according to Keysight Technologies' fourth annual security report. But the tenor of attacks changed, because hackers used the...
Xiaomi recently took Apple’s place as the world's third largest smartphone maker
With mere days left in office, President Donald Trump and his administration have added nine Chinese companies, including smartphone maker Xiaomi, to a list of firms suspected to be owned or controlled by China's...
The findings of Viavi Solutions' 13th annual State of the Network report can be summarized in one word: Disruption.
Networks are seeing "tremendous" and "dynamic disruption" as a result of "relentless technological advances, remote working reaching an all-time high and the expanding security threatscape," Viavi...
The joint document states that suppliers should be assessed for "undue foreign influence"
This week, the Czech Republic and the United States signed a joint declaration pledging cooperation on 5G network security and establishing a strict framework for assessing foreign equipment providers. Signed by Czech...
Network usage has shifted dramatically since mid-March, when the COVID-19 pandemic began having significant impacts in the U.S. As enterprises and government agencies cope with the impacts of abrupt shifts to large-scale telework, the use of business applications and video conferencing has skyrocketed. VPN...
There may be one thing growing and mutating faster than the novel coronavirus itself: human hackers' attempts to use the pandemic as an opportunity to spread their own viruses and ransomware.
Cloud security company Zscaler reported a 30,000% increase in COVID-19-themed attacks since January --...
Stealth Communications CEO: 'network privacy concerns amid remote work are being overlooked'
As homes around the world increasingly become offices and classrooms as a result of the COVID-19 pandemic, the news has been awash with headlines detailing the impact of such a shift on our...
Virtual private network use is skyrocketing as remote workers and distance learners try to reach their corporate and educational networks from their homes, in the midst of the ongoing global pandemic.
In recent weeks, VPN use around the world has surged, according to reports by...
CenturyLink announced this week that it has won a $1.6 billion network services contract with the U.S. Department of the Interior, to support IT modernization for the federal agency's enterprise network, covering areas including SD-WAN, network security and Wi-Fi access.
The Department of the Interior...
During 2020, 25% of all breaches will happen outside the network perimeter
WatchGuard has released its 2020 cybersecurity predictions, and according to the report, vulnerabilities in 5G/Wi-Fi handover and the increase of mobile device usage and remote employees will be cause for serious concern in...
Internet of Things devices are being targeted by cyber attacks within as little as five minutes of being powered up, and hackers are testing their ability to attack IoT devices behind firewalls, according to a new security report from Netscout.
Netscout said that in the...
Connected device manufacturer D-Link has agreed to boost the security of its routers and IP-connected video cameras as part of a settlement with the Federal Trade Commission.
The FTC sued Taiwan-based D-Link and its U.S. subsidiary in 2017, accusing the company of failing to take...
Ericsson and Nokia are both putting together contingency plans to move elements of their supply chains out of China if necessary due to national security tensions, according to published reports.
The Sunday Telegraph cited anonymous sources who said that both of the network infrastructure companies...
U.S. officials and a number of governments around the world have been urging restriction on, or outright bans of, the use of network equipment from Chinese vendors, due to concerns around possible "backdoor" access that could allow the Chinese government to have unauthorized access...
The size of distributed denial of service attacks is "growing at an alarming pace all around the world," according to NetScout Systems'Â 14th annual report on worldwide infrastructure security -- and as more enterprises and networks move operations to the cloud, attackers' focus is shifting...