YOU ARE AT:TagsSecurity

BROWSING: Security

IoT security to drive funding in cybersecurity startups

IoT security spending is set to increase by nearly 30% this year. Cybersecurity startups to benefit from surge in investment as funding is expected to soar. "Internet of Things" security spending is currently a relatively small market, but analyst firm Gartner estimates worldwide spending on...

IIoT security: UK manufacturers at risk from cyberthreats

The lack of IIoT security investments could put UK manufacturers at risk from cyberthreats A majority of U.K. manufacturers (62%) have plans to increase their investments in Internet-connected capital equipment in the next five years as they transition to "industry 4.0." However, investment plans in industrial...

Reality Check: Wearable devices underscore need for secure design

Security issues connected with consumer uptake of wearable devices and the ‘Internet of Things’ remains a significant hurdle for the market Wearable computing devices are changing the way humans interact with technology and that shift has security implications that must be addressed. Wearable fitness tracking...

#TBT: Sprint strong but cautious; job market on the rocks … this week in 2001

Sprint posted strong Q1 results, but said it remains cautious on future growth, while job cuts across telecom space cause concern … 15 years ago this week Editor’s Note: RCR Wireless News goes all in for “Throwback Thursdays,” tapping into our archives to resuscitate the...

Reader Forum: 6 tips to safely decommission your BYO device

MaaS360 by IBM provides 6 tips for the decommission of bring-your-own-devices in the enterprise In the world of bring-your-own-device policies, users may run through multiple devices per year – a departure from the typical 18-month or two-year upgrade for the general population. As BYOD grows,...

Using SD-WAN to combat DDoS and other aggressive attacks

On this week’s NFV/SDN Reality Check we look at some top news items and speak with Serro Solutions to discuss how SD-WAN is now being applied to combat evolving security threats such as DDoS and other aggressive attacks On today’s show we have an interview...

Verizon Enterprise division hacked

Verizon Enterprise Solutions hack claims info on 1.5M customers, data offered up for $100,000 Verizon Communications’ Enterprise Solutions division was hit by a data breach that reportedly included information on 1.5 million customers, which ended up for sale online. According to a report from Krebs on...

Apple vs. FBI heats up ahead of March 22 court date

Much broader questions about security and privacy at stake, Apple argues; Woz weighs in Apple and the FBI, engaged in an increasingly heated legal exchange over an alleged terrorist’s iPhone that has also sparked a national discussion about digital security, are set to meet in...

Reader Forum: How to control data access on mobile devices

Graphite Software looks at ways to control data access on mobile devices for children Poor, beleaguered parents these days. Not only do they have to wage daily battles with their kids about too much “screen time” at home, they have to track the security, privacy...

DDoS attack security for NFV- and SDN-powered networks

On this week’s NFV/SDN Reality Check, we look at some top news items from across the space as well as speak with A10 about DDoS attack security for NFV- and SDN-powered networks On today’s show we have an interview with Rene Paap, product marketing manager...

Lack of awareness drives growth of malware attacks on smartphones

BARCELONA, Spain – Smartphones users haven’t realized yet the importance of protecting their mobile devices from hacker attacks, viruses and malware. In a video interview with RCR Wireless News, Gagan Singh, president for Avast's mobile division, noted that despite a growth in attacks on...

Reader Forum: Mobile fraud – are the new attack frontiers really invisible?

Argyle Data parcels out insight from a recent report to study the impact new and emerging mobile fraud types on operator revenues The overall reported cost of fraud was reported as down from $46 billion in 2013 to $38 billion in 2015, according to the...

Versa partners with EMC on VNF supporting security, network management

Versa VNF software validated for interoperability with EMC NFVI platform Networking and security vendor Versa Networks said it received validation for a new platform designed to provide managed network and security services using virtualized network functions and x86-based open hardware. Versa said the validation came from...

2016 Predictions: Mobile, cloud and IoT impact on security strategies

F5 Networks looks at the impact mobile, cloud and IoT will have on security strategies in 2016 Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new...

Deutsche Telekom to launch security unit

New security business unit set for 2017 launch German telecoms operator Deutsche Telekom is planning to create a new business unit dubbed “Telekom Security” focused on security solutions. The operator said Telekom Security products will be marketed under the "Magenta Security" brand beginning in mid-2016. The...

2016 Predictions: IoT and security in 2016

Inside Secure forecasts increased security needs as the IoT market continues to grow Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. Gartner predicts the number...

2016 Predictions: Top resolutions for nurturing subscriber loyalty, increasing profitability in 2016

Allot lays out its top resolutions for the telecom operators looking to nurture subscriber loyalty, increase profits Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new...

2016 Predictions: The importance of encrypted communications in 2016

Pryvate sees the need for encrypted communications Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. A recent survey by Pryvate found 29% of U.S. consumer...

2016 Predictions: Security, devops, big data and mobile testing

HPE sees security, devops, big data and mobile testing changes ahead Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. Hackers will truly embrace the ‘Internet...

2016 Predictions: Growing an industry of multiple devices and millions of users

Move towards multiple devices, million of users sets stage for significant growth Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. Since Martin Cooper invented the...

2016 Predictions: Cloud set to boost security, options for enterprises

Shlomo Kramer, founder and CEO of Cato Networks, sees cloud platforms boosting security, options for enterprises Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. The...

2016 Predictions: AT&T cites cybersecurity focus for 2016

AT&T expects more cybersecurity threats for the new year Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. In 2014, businesses suffered nearly 43 million known...

2016 Predictions: Mobile operators to benefit from Hadoop

Hadoop to impact how mobile operators tackle big data Editor’s Note: With 2016 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. Last January we predicted 2015 would be...

Ixia Webinar: Network Security Deployment Best Practices

Today’s threat landscape demands the use of a complex array of proactive network security systems and monitoring solutions. What are the most common and useful network security solutions you should consider - next-gen firewalls, web-application firewalls, intrusion prevention systems? Many of these security tools require...