YOU ARE AT:TagsSecurity

BROWSING: Security

EMEA: Automotive Ethernet – safe or sorry?

Claudia Bacco, Managing Director – EMEA for RCR Wireless News, has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...

EMEA: Nokia Security Center live in Berlin

Claudia Bacco, Managing Director – EMEA for RCR Wireless News – has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...

IEEE GlobeCom: Cloud security through virtualization

AUSTIN, Texas – Speaking at this week's IEEE GlobeCom expo in Austin, AT&T Chief Security Officer Edward Amoroso proposed that enterprise cloud security could potentially be based on the same network architecture used by an infamous piece of malware. Amoroso gave a keynote speech envisioning...

EMEA: Deutsche Telekom partners with U.S.-based FireEye to fight cyber attacks

In the ongoing battle against cyber attacks and espionage, Deutsche Telekom's business customer unit, T-Systems, is joining with the Silicon Valley firm FireEye to offer security-as-a-service to European organizations. According to a FireEye study, many European firms are not able to quickly respond to breaches ― the median response...

EMEA: Slush 2014 recap

Slush 2014 took place this week in Helsinki, Finland. Started in 2008 with only around 150 attendees, this year’s attendee count clocked in at just over 14,000 showing amazing growth. The atmosphere was a mix of nightclub and conference, with participants from a range...

Reader Forum: Will Apple’s encryption move trigger stronger surveillance laws?

Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we maintain some editorial control...

Report: Mobile, security, big data to drive 2015 hiring trends

The annual look at technology hiring trends by research firm Robert Half Technology concludes that mobile, big data and network security are driving businesses trends now, and will shape 2015 hiring trends in the tech fields. "The supply of highly skilled technology professionals is expected...

What is a micro-VPN?

Today's mobile workers are often more than willing to use personal devices to get work done, and that can mean significant savings for their employers. Not only can IT spending on devices go down, but productivity can go up. The downside, of course, can be...

EMEA: Europe’s ‘real digital commissioner’ takes aim at US data deal

Andrus Ansip, the candidate to lead the European Union's Digital Internal Market, is willing to suspend the safe harbor agreement with the U.S. if Europe's security concerns are not addressed. The safe harbor agreement regulates the transfer of Europeans' personal data to the U.S. It affects thousands of technology...

EMEA: Russia’s attempt to close off Internet, part of a trend?

Vladimir Putin wants to take Russia off the global Internet in case of an emergency, like war or anti-government protests, according to recent reports — reports which, of course, the Kremlin denies. It's easy to dismiss this move as the madness of Vlad (as German Chancellor Angela...

EMEA: Cyber attacks grow out of Ukrainian, Middle East conflicts

Cyber war is not the stuff of science fiction any more. More than disruptive hacks and information theft, cyber attacks are now a significant part of the conflicts in Eastern Europe and the Middle East. At a press conference in Wales last week, NATO Secretary General Anders Fogh...

EMEA: Russian crisis threatens the E-Estonia experiment

When President Obama visited Estonia last week to deliver a warning to Russia, he also drew the spotlight to one of the most connected countries in the world. Estonia was freed from Soviet rule in 1991 and the tiny Baltic country of 1.3 million immediately...

Hacker finds suspicious programs in Apple's iOS

The hacker nicknamed “NerveGas,” also known as the forensic scientist Jonathan Zdziarski, claims to have identified back doors, attack points and surveillance mechanisms running on all Apple iOS devices. Zdziarski, who was a development team member on many of the early iOS jailbreaks, recently detailed...

Europe: Secure home care that learns

Essence has been around for 20 years providing professional-graded security solutions. While not the first type of company that comes to mind when thinking about home care solutions, they have over 10 million products deployed and are focusing on bringing machine-to-machine functionality into the...

Reader Forum: PKI takes center stage in the ‘Internet of everything’ age

While IoT creates process improvements across all industries and facets of life, it increases the need for mobile security.

How to make telematics sexy? Change the name to connected cars

It seems the telecom industry does this on a regular basis. We come up with an idea, and we talk about if for years and it still seems to be some unreachable goal in the future. Then we change the name to a more...

Reader Forum: Better authentication methods for mobile payment security

Why don’t consumers wholeheartedly embrace the ease and convenience of mobile payments? Quite simply, they are worried about the security risk. That’s understandable, given that trust in the security of personal

Analyst Angle: Security and the 'Internet of Things'

Cyber-attacks continue to become more innovative and sophisticated. Unfortunately, while organizations are developing new security mechanisms, cyber-criminals are cultivating new techniques to circumvent them.

Europe: Dutch proposal would protect KPN from takeover

Following América Móvil's failed bid to takeover KPN last year, the Dutch government is now floating a proposal that would allow it to intervene in any telecom acquisition that had “implications for national security.” In a June 10 letter to parliament, the Dutch minister of economic...

Reader Forum: Key strategies to keep your network secure

Wireless connections come with inherent risks. Here's the lowdown on securing both types of networks.

Reader Forum: Next-generation service provider security – dynamic multi-layered defense

The concept of service provider security is undergoing a significant shift due to changes in several key areas: business, technology and the profile of the attacker.

Mobile drives need for better security, says Wedge Networks

Wedge Networks has a new software-based security solution that it says delivers on the promises of software-defined networking (SDN): cheaper infrastructure costs, easy scalability, and performance similar to hardware-based offerings. Wedge recently participated in an network function virtualization(NFV) testing demonstration with Spirent at Interop that...

Cisco opens, expands security platform

Cisco is opening up its IP Cameras platform for safety and security applications in order to allow customers to create their own applications that integrate the company's security cameras and analytics. In an Internet roundtable on Tuesday, Cisco and some customer representatives discussed the new...

Reader Forum: Wireless network security – a cautionary tale

The fun and flurry of retail discounts during the high-volume holiday shopping season were marred last year by the much-publicized breach of customer data at popular retailer Target.