YOU ARE AT:TagsSecurity

BROWSING: Security

Orange Business Services’ IoT security service leverages Ericsson threat monitoring

  Orange Business Services has a new IoT security offering for cellular IoT, for which the firm collaborated closely with Swedish vendor Ericsson. Ericsson said that the new service will target Orange Business Services' enterprise customer base. Security will be a critical success factor in the...

Netscout: DDoS attacks hit a record ‘new normal’ as cybercriminals exploit pandemic conditions

Netscout observed a record 10 million dedicated denial of service (DDos) attacks in the second half of 2020, and the lessons it distilled from the resulting data are pretty bleak: Even as the world grappled with the impacts of a global pandemic, cybercriminals were...

Fujitsu, Trend Micro run the rule over private 5G security at Japanese smart factory

Japanese IT company Fujitsu and US-Japanese cyber security company Trend Micro have partnered to “focus on” the security of private 5G networks. The pair said they will use a simulated smart factory environment at a Fujitsu factory  in Japan to run the rule over...

Well, technically… 5G will significantly increase entry points for security threats: Nokia’s Mona Noor (Ep. 33)

Mona Noor, a product manager at Nokia, dives into some of the biggest security threats our networks will have to deal with in a 5G era, compares the inherent security of cloud and on-premise servers and explains why home IoT devices aren't built to...

Verizon Ventures invests in Israeli security startup Vdoo

  Verizon Ventures and Qumra Capital have provided funding for Israeli firm Vdoo, which is a specialist in security solutions for connected products. In a release, Vdoo revealed it had extended its Series B funding to $57M, in an additional round led by Qumra Capital, Verizon...

A10 Webinar: Security for the 5G Core

Mobile network operators are rapidly moving to 5G SA (5GC) networks. The vast majority of operators are expecting to deploy within the next 3 years. While many expect that most of their traffic will be carried by 5G networks within 5 years, 4G and...

UK government proposes new telecom security bill

The U.K. government proposed a new bill to increase its control capabilities over telecoms networks, which could result in operators being hit with large fines if they fail to adhere to new security requirements. In a statement, the government noted that the Telecommunications Security Bill...

BT, Toshiba deploy unhackable quantum-secure fibre for Industry 4.0 data transfers

BT and Toshiba have deployed an unhackable six-kilometre length of quantum encrypted fibre optic cable for transfer of highly sensitive data between different industrial facilities. It is the first deployment in the UK of a quantum-secure point-to-point fibre network, for sharing encryption ‘keys’ between...

Wi-Fi 6 and 5G: Which is more secure and where is my data going?

While Wi-Fi 6 and 5G may both be secure, important questions about data ownership remain Historically, one of Wi-Fi’s biggest drawbacks, particularly in comparison to cellular, was the level of security it could offer. Unlike Wi-Fi, wireless cellular technology has the wireless security layer as...

Huawei Webinar: Why America Needs Strong National Privacy Regulation

The pandemic has highlighted the importance of personal data and digital connectivity, to the detection, treatment, and prevention of COVID-19. The major social media platforms for search, marketing, and transactions involve the collection and use of personal data in historic proportions in ways that...

Five top 5G use cases for enterprises, according to Nokia

The 5G use cases span a number of different industry sectors After speaking with over 1,000 IT decision-makers at U.S. and U.K. enterprises, Nokia released a new study called “Mapping demand: The 5G opportunity in enterprise for communications service providers,” which revealed the top five...

Huawei Webinar: Cybersecurity Standards and Testing in Europe

Comprehensive, credible, internal and external testing of all network elements is a critical component of effective, trustworthy cyber security. Independent external testing is also essential to certify compliance with industry standards by equipment vendors, network operators, and service providers. On May 20, join us for...

Huawei Webinar: TECH4ALL / Saving the Rainforests with Artificial Intelligence

  The world’s rainforests are some of the most important, life-sustaining natural resources on the planet. Yet these beautiful, valuable environments are under constant threat from illicit loggers, hunters, and poachers. Fortunately, artificial intelligence (AI) technologies, combined with wireless communication, is helping to preserve and...

Huawei Webinar: The Significance of the Semiconductor Industry in the US

  Boston Consulting Group (BCG) research finds the United States is the global leader of the semiconductor market, with a 45-50% market share. That leadership relies upon very large investments in R&D, which are funded by access to global markets. Chinese companies, for example, account...

Huawei Webinar: COVID-19, Connectivity and Community

  The coronavirus pandemic has transformed how many around the world work, learn, and live. Now more than ever, access to secure, modern connectivity is essential to supporting and maintaining teams, communities, and other human-to-human interactions and relationships. On April 29, join us for an inspiring...

Huawei Webinar: 5G Security – A Shared Responsibility

  Cyber threats have no single home country and respect no borders. This makes effective cyber security a responsibility shared by equipment vendors, software developers, users, and all other stakeholders who want, need, and depend upon secure, accessible connectivity. This webinar will feature two cyber security...

The security of a device starts with its main building blocks: its cellular module

  Quectel: ‘As hackers get more sophisticated, so too will our modules’ As the number of connected devices in homes, throughout cities or within enterprises continues to increase, so do the opportunities for attacking security vulnerabilities. According to Neset Yalcinkaya, VP of Product and GM of...

LoRaWAN enters 2.4 GHz – plus new space race, network sharing, embedded security

LoRaWAN will work in the 2.4 GHz spectrum band, also occupied by Wi-Fi and Bluetooth systems, to enable LoRaWAN-based IoT devices to work globally at the same frequency for the first time, without needing to switch between sub-GHz bands in roaming.  That is the proposal,...

Cisco intros new IoT security architecture

  Cisco introduced an IoT security architecture that provides enhanced visibility across both IT and IoT environments, and protects processes, the networking company said in a release. Cisco said its new solutions enable the collection and extraction of data from the IoT edge, so organizations can...

From security to slicing, cell site routers are key to 5G success

  As 5G moves beyond enhanced mobile broadband, the importance of cell site routers as RAN service nodes comes into sharp focus The current thrust of 5G network deployments is offering up a consumer-facing enhanced mobile broadband experience. This, in and of itself, involves operators deploying...

How to develop 5G security standards at a global scale

  As the underlying technology that comprises 5G has developed, a variety of industry groups, working hand-in-hand with national and international regulatory agencies, have collaborated to ensure global scalability of the next generation of cellular. This unified approach, as with previous generations of technology, is...

How should stakeholders work together to ensure 5G security?

  By its very nature, 5G is complex. Next generation networks are going live all over the globe and operators are working in earnest to secure the capital dollars needed to scale 5G, continue to enhance the technology and deliver cutting-edge consumer and enterprise services.  This...

Sierra Wireless on 2020: IoT integration, sub-6GHz 5G, Industry 4.0

  Cloudification of IoT accelerates Philippe Guillemette, chief technology officer, Sierra Wireless:  “The complexities that companies experience building out and maintaining IoT infrastructure has hindered growth of the sector, leading to the failure of as many as 75 per cent of IoT projects. “However, in 2020, we will see an...

Sigfox on 2020: Three key areas for growth and democratization of IoT

  Ajay Rane, vice president for global business development, Sigfox: The IoT, and the networks that devices run on, are poised for growth and maturity in 2020. Key to this will be an expansion in network coverage, as well as a reduction in the cost of...