YOU ARE AT:TagsSecurity

BROWSING: Security

Verizon DBIR: Mobile is not a significant data breach threat

Verizon's latest look at data breaches and network security concludes that mobile continues to be relatively secure – not a preferred path for real-world data breaches – in spite of the presence of malware. This year's Data Breach Investigation Report tallied nearly 80,000 security incidents, with more...

Worst of the Week: FCC fines – what’s the price of shame?

Hello! And welcome to our Friday column, Worst of the Week. There’s a lot of nutty stuff that goes on in this industry, so this column is a chance for us at RCRWireless.com to rant and rave about whatever rubs us the wrong way....

Takeovers bear fruit for Cisco in mobile security

A string of takeovers has given Cisco new security capabilities, and this week the company revealed how it's putting the pieces together. The IT giant has added new analytics capabilities to its malware protection portfolio, bringing together firewall technology acquired from Sourcefire in 2013...

Reader Forum: How to ensure your business phone systems are secure

Hackers have been featured on the news recently as credit cards and passwords have been obtained in breaches, leaving millions to worry about whether their bank accounts or e-mail addresses are secure. However, there is another area that unethical hackers are targeting that isn’t...

Analyst Angle: Security in the age of BYOx

In the face of unstoppable corporate and consumer adoption of mobile devices, security and privacy implications of cloud and mobile are a deepening concern for many security professionals. Most organizations are just beginning to adopt and integrate "bring-your-own-device" policies, putting them several steps behind...

HP set to acquire encryption firm Voltage Security

HP to buy Voltage Security Hewlett-Packard announced plans to buy data-encryption company Voltage Security in what appears to be a push toward cloud-based security products. Financial terms of the deal were not disclosed. HP said it fold Cupertino, Calif.-based Voltage into its security division, Atalla. Stanford University...

EMEA: Nokia Networks powers 5G IoT

The "Internet of Things," 5G and security are all hot topics. Nokia Networks has pulled them all together in announcing its vision for secure IoT connectivity via 5G that will be demonstrated at the upcoming Mobile World Congress event. There are many statistics in the public...

Connected car universe 2015 predictions

Defining the industry connected car landscape was challenging. It started with the very first question for the interview participants: What category would you describe yourself as within the connected car landscape? Thinking this would be an easy question, many respondents considered it to be a difficult one...

2015 Predictions: cloud economics and security

Cloud economics Capital expenses vs. operating expenses has been debated rigorously for some time now, and many cite capex reduction as the reason for moving to the cloud. However, whether on the capex side or the opex side of the debate, organizations are still missing...

EMEA CEOs: F-Secure on 2015 security challenges

The data-threat landscape continues to gain sophistication. With every solution launched to protect our data, there seems to be a new tactic in play to undermine that protection. F-Secure is working hard to stay ahead of the criminals, hackers and espionage activities as they become...

2015 Predictions: CEM, big data, security will be important in 2015

The new year is upon us and while there are a number of evolving trends driving the industry in 2015 and beyond – from big data, to cloud, 5G and security – there clearly is work to be done. January is a prime time...

Vitesse talks Ethernet in connected cars

In this Q&A session, Vitesse Semiconductor CTO Martin Nuss discusses connected cars and Ethernet’s role in ensuring their functionality and security. RCR Wireless News: Connected car is a fairly broad term. What exactly does it mean? Martin Nuss: While the "connected car" concept has been around for quite some...

Generation Wireless: Overcoming the trust deficit

Much has been written about the long-term impact of the “sharing economy,” with most focused on the sociological, cultural and monetary aspects by implications of an economic model that depends on more people sharing fewer resources. I for one am very impressed by how...

Cisco highlights emerging security threats

Network security is big business for Cisco, and each year the company provides updates on potential new threats and the evolution of existing security loopholes. Cisco's annual security report this year highlights three trends, and also offers insight on the changing nature of countermeasures. Snowshoe...

2015 Predictions: Mobility in 2015 and beyond

Wi-Fi/LTE integration, security, cloud set to impact mobility in 2015 Subscribers are using 4G LTE networks and consuming wireless data 14-times more than on non-4G networks, according to a recent Cisco Systems study. Today, a multitude of applications and devices are available to consume the...

Securing the connected car

Privacy and security are on everyone’s mind when it comes to the connected car: all of the industry players, consumers and regulatory organizations. Starting with data privacy, there is a hornet’s nest of requirements depending upon geography. In the U.S., usage-based insurance solutions are a...

2015 Predictions: Data security compliance tightens within telecom

Editor’s Note: With 2015 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. The Fifth Amendment of the U.S. Constitution includes a clause commonly referred to as the “double...

Mobile privacy and security: How to make your phone untraceable

"We all carry a smartphone, we carry a tablet, we carry mobile devices and they're in our hands wherever we go. I want you to stop and think about that, it has two cameras on it, it has two microphones, it has GPS, it...

IoT security concerns; now is the time to act

IoT security concerns; the stakes are high There's no question that one of the biggest trends of 2015 will be the push to make all things connected. At CES 2015 in Las Vegas, most announcements and product reveals centered around the "Internet of Things." "This is...

2015 Predictions: Mobile security set for change in 2015

Editor’s Note: With 2015 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. As 2014 came to an end, it’s clear we closed out: “The year of the epic...

Generation Wireless: The mobile identity

Editor’s Note: Looking to bring a younger perspective to the mobile space, RCR Wireless News has tapped Jeff Hawn to provide insight into what’s on the minds of the tech-savvy youth of today. Iowa recently passed a law that allows citizens to present a digital...

EMEA: LTE hacks, fake BTS and games that steal your secrets

Claudia Bacco, Managing Director – EMEA for RCR Wireless News, has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...

Generation Wireless: LS is watching

Editor’s Note: Looking to bring a younger perspective to the mobile space, RCR Wireless News has tapped Jeff Hawn to provide insight into what’s on the minds of the tech-savvy youth of today. George Orwell’s classic dystopia novel “1984” popularized the phrase “Big Brother is...

Reality Check: The keys to solving the mobile security conundrum

Editor’s Note: Welcome to our weekly Reality Check column where C-level executives and advisory firms from across the mobile industry share unique insights and experiences. Every day, it seems there is another high-profile security breach in the news. These stories have only served to highlight...