YOU ARE AT:TagsSecurity

BROWSING: Security

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...

Qualcomm’s new camera platforms enable virtual reality, IoT

HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at its 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics,...

Qualcomm’s new camera platforms enable virtual reality, IoT

HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at the 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics, 4K High...

Reader Forum: Smart fraud scores help CSPs onboard customers, stop ‘fraudsters’

Fraud remains a significant risk for communication service providers, but the right tools can help prevent issues and speed up the onboarding of new customers Today’s business environment is fraught with identity theft, data breaches and overall fraud exposure. Communications service providers are particularly vulnerable to...

Feature Report: Testing the Internet of Things – Making the IoT Work

As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different. RCR...

Feature Report: Testing the internet of things – making the IoT work

As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different. RCR...

AT&T strikes cloud deals with AWS, IBM targeting enterprise clients

AT&T cloud business now includes support from Amazon Web Services and deeper integration with IBM targeting enterprise customers AT&T bolstered its cloud efforts, announcing deals with Amazon Web Services and IBM. The multiyear deal with AWS calls for the delivery of integrated solutions using each company’s...

Analyst Angle: Yahoo hack – what this means to the enterprise

Connected to the Yahoo hack, can users protect themselves from future attacks and will it affect the sale to Verizon/AOL? I think you’d have to have been living in a cave if you didn’t see any online news stories or live TV news broadcasts about...

IIC releases official framework for industrial IoT security

Securing the industrial IoT  The Industrial Internet Consortium, an organization formed to accelerate the industrial "internet of things," today published the Industrial Internet Security Framework, a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five IIoT characteristics: safety,...

IIC releases official framework for industrial IoT security

Securing the industrial IoT  The Industrial Internet Consortium (IIC), an organization formed to accelerate the industrial internet of things (IIoT), today published the Industrial Internet Security Framework (IISF), a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five...

Reader Forum: For CSPs IoT, NFV and SDN is era of growing opportunity and risks

As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...

Cisco and Zones protect beer with connected distribution center

Saving money and creating a connected beer center Del Papa is a beer distribution company founded more than a century ago, and the company today distributes 10 million cases of beer annually from 30 suppliers. More than 375 employees work at their headquarters in Texas City,...

Case Study: Lockheed Martin uses big data for F-35 maintenance

Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...

Case Study: Lockheed Martin uses big data for F-35 maintenance

Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...

Reality Check: Security industry must embrace modern PTT technologies

Can the use of IP-based PTT platforms allow for a more profitable, secure and efficient working environment in the security space? The global security industry is growing at a rapid pace. More professional and coordinated operations across disciplines and geographical borders among criminals is one...

Here is what companies are doing to secure the IIoT

IIoT security: critical importance, under-addressed The industrial internet of things presents a cybersecurity concern of a scale we have never before seen. Its premise alone – making every "thing" around us connected to a network – is enough to spur the imagination of entire environments...

Considerations and approaches to securing the IIoT

The dangers of an insecure IIoT system Wired detailed the frightening consequences of vulnerable computer-based systems in its 2008 article Industrial control systems killed once, and will again, experts warn. With the expansion of “smart devices” into the automobile and medical industries, those predictions are more...

Reader Forum: Cybersecurity concerns in the world of building automation

Does continued growth of the IoT open up cybersecurity concerns for building automation? Every day when we arrive at the office we take some things for granted – the lights will be on, the heat or air conditioning will be working and the building entry...

Rio Olympics: Cybersecurity a high priority

Security is one of the major concerns surrounding the Rio 2016 Olympic and Paralympic Games, and not only physical security. Information and communications technology providers interviewed by RCR Wireless News for a special Olympics series (check all stories here) put cybersecurity at the top of their list...

Case study: Honeywell turns stadium into smart building

Preparing for the Olympics with a smart building Honeywell created what it called the "intelligent system" for the National Stadium in Beijing, China, turning the venue for the opening and closing events at the 2008 Summer Olympics into a "smart building." Designed by highly controversial artist...

Case study: Honeywell turns stadium into smart building

Preparing for the Olympics with a smart building Honeywell created what it called the "intelligent system" for the National Stadium in Beijing, China, turning the venue for the opening and closing events at the 2008 Summer Olympics into a "smart building." Designed by highly controversial artist...

Reader Forum: 3 tips to prepare for the Rio ‘data’ Olympics

Baidu provides 3 tips for operators looking to support a surge in data connected with the upcoming 2016 Summer Olympic Games in Brazil With spectators streaming the events worldwide, athletes posting pregame rituals on social media and fans taking selfies in the stands, smartphone activity...

Cisco agrees to acquire cloud security firm for $293M

In a move intended to bolster its end-to-end cloud security portfolio, Cisco this week agreed to acquire Massachusetts-based security startup CloudLock for $293 million. CloudLock uses an API-based approach to provide cloud access security broker tech geared toward enterprise-grade security and analytics related to cloud...

Report: 65% of enterprises using internet of things technology

Security is primary hold up to enterprise internet of things The majority of enterprises have already deployed internet of things solutions, according to a new report from 451 Research, which saw the greatest adoption coming from utilities and manufacturers. Taking stock of the source of enterprise...