AT&T, IBM and Nokia part of founding group of companies targeting IoT security.
AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic formed the IoT Cybersecurity Alliance, with a focus on helping enterprises tackle security challenges tied to the internet of things. AT&T...
I recently bought a new car with all the bells and whistles. It warns me if I stray out of my lane. It warns me if there is a car in my blind spot. It has adaptive cruise control that slows down if a...
The internet of things market is hitting a tipping point in terms of consumer confidence shook by growing security concerns.
Editor’s Note: The RCR Wireless News Reality Check section is where C-level executives and advisory firms from across the mobile industry...
The increasingly connected nature of enterprises and unified communications requires a rethink on security models.
Editor’s Note: The RCR Wireless News Reality Check section is where C-level executives and advisory firms from across the mobile industry share unique insights and experiences.
The arrival of the...
The growing IoT ecosystem will see advances in machine learning, greater collaboration, new analytics and increased security emerge.
Editor’s Note: With 2017 now upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they expect to...
Ransomware made headlines in 2016, but is expected to be a larger issue in 2017.
Editor’s Note: With 2017 now upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they expect to see in...
QoE regulations, IoT security challenges and the expansion of zero-rated data services set for 2017.
Editor’s Note: With 2017 now upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they expect to see in the...
A recent rash of malware attacks on Microsoft’s RDP calls into question current thinking in terms of battling Trojan attacks.
Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something...
Application-to-person text messaging platforms will see expansion from new business models, enterprise adoption and take a bite out of IoT.
Editor’s Note: With 2017 now upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they...
HPE sees growing security concerns altering how organizations attempt to oversee their operations across mobile networks.
Editor’s Note: With 2017 now upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they expect to see...
Earlier this month, EyeLock, a company focused on iris-based identity authentication solutions, announced the introduction of three reference designs architected for high volume OEM integration. EyeLock's new product was designed to fill the rapidly increasing demand for iris authentication solutions for "internet of things" devices and applications...
Security is a growing challenge for the telecommunications space, made even more so by the lack of attention paid by operators.
The last decade has seen a boom in the telecommunications space like no other industry in the world. In 2006,...
5G networks to boost cellular operations, IoT security and network challenges and driving the internet further to the edge.
Editor’s Note: With 2017 virtually upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what they expect...
Cybersecurity is set to become more challenging in 2017, with IoT, DDoS, predictive analytics and automobiles just some of the segments.
Editor’s Note: With 2017 virtually upon us, RCR Wireless News has gathered predictions from across the mobile telecommunications space on what...
The use of biometrics for security by the mobile industry is growing, but partnerships are key to ensure continued development and deployment.
In today’s digital world, we rely on our mobile devices to save copious amounts of personal information. With the emergence of...
Last week, BlackBerry unveiled its mobile-native approach to security with the launch of a platform designed for the industrial "internet of things." The BlackBerry Secure platform is a product of the company’s individual security offerings combined into a single suite. The cloud-enabled approach was...
IBM goes all in with blockchain.
IBM this week announced a blockchain ecosystem designed to help accelerate the creation of networks using the technology.
The ecosystem program is designed for large-businesses, startups, systems integrators, independent software vendors and enterprise developers. To support...
We spoke with Jim Hunter, Greenwave Systems’ chief scientist and technology evangelist, on the new Trump-led administration, governmental IoT security regulations and interoperability.
https://www.youtube.com/watch?v=viUkId8jSj8
The United States government recently released guidelines on securing the IoT, following the lead of countries in Europe and Asia.
"What is starting...
Mobile operators should look to sports fans as a way to educate them on potential security threats and the opportunity to sell new services.
Mobile has changed the way people experience sporting events as fans shift to the digital arena to...
Cloud security plans require telecom operators and enterprises to think about total protection processes and take into account software platforms.
Telecommunication operators are increasingly turning towards virtualized platforms in order to bolster agility, reduce costs and better position themselves to compete against...
Cloud access security brokers are seen as one way telecom operators can ensure robust protection as they venture into the cloud.
With telecom operators increasing their reach into cloud environments, steps need to be taken in order to ensure such moves do...
Fujitsu said that it aims to cut 1,800 jobs in the U.K.
Japanese IT equipment and services company Fujitsu has plans to cut nearly 1,800 jobs from its U.K. operation in a move to improve margins, international press reported, citing the firm’s chair for the...
Telecom operators are in a prime position to use their network insights and net neutrality legislation to counter DDoS attacks and target new business opportunities.
Net neutrality is at the core of the internet’s guiding principles. The idea that internet...
Integration, orchestration and security noted by Radware as key challenges facing ongoing SDN, NFV and cloud deployment models.
On this week’s NFV/SDN Reality Check we speak with Frank Yue, director of application delivery solutions at Radware, on development, deployment and challenges facing the telecom space...