Claudia Bacco, Managing Director – EMEA for RCR Wireless News, has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...
Claudia Bacco, Managing Director – EMEA for RCR Wireless News – has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...
AUSTIN, Texas – Speaking at this week's IEEE GlobeCom expo in Austin, AT&T Chief Security Officer Edward Amoroso proposed that enterprise cloud security could potentially be based on the same network architecture used by an infamous piece of malware.
Amoroso gave a keynote speech envisioning...
In the ongoing battle against cyber attacks and espionage, Deutsche Telekom's business customer unit, T-Systems, is joining with the Silicon Valley firm FireEye to offer security-as-a-service to European organizations.
According to a FireEye study, many European firms are not able to quickly respond to breaches ― the median response...
Slush 2014 took place this week in Helsinki, Finland. Started in 2008 with only around 150 attendees, this year’s attendee count clocked in at just over 14,000 showing amazing growth. The atmosphere was a mix of nightclub and conference, with participants from a range...
Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we maintain some editorial control...
The annual look at technology hiring trends by research firm Robert Half Technology concludes that mobile, big data and network security are driving businesses trends now, and will shape 2015 hiring trends in the tech fields.
"The supply of highly skilled technology professionals is expected...
Today's mobile workers are often more than willing to use personal devices to get work done, and that can mean significant savings for their employers. Not only can IT spending on devices go down, but productivity can go up.
The downside, of course, can be...
Andrus Ansip, the candidate to lead the European Union's Digital Internal Market, is willing to suspend the safe harbor agreement with the U.S. if Europe's security concerns are not addressed.
The safe harbor agreement regulates the transfer of Europeans' personal data to the U.S. It affects thousands of technology...
Vladimir Putin wants to take Russia off the global Internet in case of an emergency, like war or anti-government protests, according to recent reports — reports which, of course, the Kremlin denies.
It's easy to dismiss this move as the madness of Vlad (as German Chancellor Angela...
Cyber war is not the stuff of science fiction any more. More than disruptive hacks and information theft, cyber attacks are now a significant part of the conflicts in Eastern Europe and the Middle East.
At a press conference in Wales last week, NATO Secretary General Anders Fogh...
When President Obama visited Estonia last week to deliver a warning to Russia, he also drew the spotlight to one of the most connected countries in the world. Estonia was freed from Soviet rule in 1991 and the tiny Baltic country of 1.3 million immediately...
The hacker nicknamed “NerveGas,” also known as the forensic scientist Jonathan Zdziarski, claims to have identified back doors, attack points and surveillance mechanisms running on all Apple iOS devices. Zdziarski, who was a development team member on many of the early iOS jailbreaks, recently detailed...
Essence has been around for 20 years providing professional-graded security solutions. While not the first type of company that comes to mind when thinking about home care solutions, they have over 10 million products deployed and are focusing on bringing machine-to-machine functionality into the...
It seems the telecom industry does this on a regular basis. We come up with an idea, and we talk about if for years and it still seems to be some unreachable goal in the future. Then we change the name to a more...
Why don’t consumers wholeheartedly embrace the ease and convenience of mobile payments? Quite simply, they are worried about the security risk. That’s understandable, given that trust in the security of personal
Cyber-attacks continue to become more innovative and sophisticated. Unfortunately, while organizations are developing new security mechanisms, cyber-criminals are cultivating new techniques to circumvent them.
Following América Móvil's failed bid to takeover KPN last year, the Dutch government is now floating a proposal that would allow it to intervene in any telecom acquisition that had “implications for national security.”
In a June 10 letter to parliament, the Dutch minister of economic...
The concept of service provider security is undergoing a significant shift due to changes in several key areas: business, technology and the profile of the attacker.
Wedge Networks has a new software-based security solution that it says delivers on the promises of software-defined networking (SDN): cheaper infrastructure costs, easy scalability, and performance similar to hardware-based offerings.
Wedge recently participated in an network function virtualization(NFV) testing demonstration with Spirent at Interop that...
Cisco is opening up its IP Cameras platform for safety and security applications in order to allow customers to create their own applications that integrate the company's security cameras and analytics.
In an Internet roundtable on Tuesday, Cisco and some customer representatives discussed the new...
The fun and flurry of retail discounts during the high-volume holiday shopping season were marred last year by the much-publicized breach of customer data at popular retailer Target.