Orange Business Services has a new IoT security offering for cellular IoT, for which the firm collaborated closely with Swedish vendor Ericsson.
Ericsson said that the new service will target Orange Business Services' enterprise customer base. Security will be a critical success factor in the...
Netscout observed a record 10 million dedicated denial of service (DDos) attacks in the second half of 2020, and the lessons it distilled from the resulting data are pretty bleak: Even as the world grappled with the impacts of a global pandemic, cybercriminals were...
Japanese IT company Fujitsu and US-Japanese cyber security company Trend Micro have partnered to “focus on” the security of private 5G networks. The pair said they will use a simulated smart factory environment at a Fujitsu factory in Japan to run the rule over...
Mona Noor, a product manager at Nokia, dives into some of the biggest security threats our networks will have to deal with in a 5G era, compares the inherent security of cloud and on-premise servers and explains why home IoT devices aren't built to...
Verizon Ventures and Qumra Capital have provided funding for Israeli firm Vdoo, which is a specialist in security solutions for connected products.
In a release, Vdoo revealed it had extended its Series B funding to $57M, in an additional round led by Qumra Capital, Verizon...
Mobile network operators are rapidly moving to 5G SA (5GC) networks. The vast majority of operators are expecting to deploy within the next 3 years. While many expect that most of their traffic will be carried by 5G networks within 5 years, 4G and...
The U.K. government proposed a new bill to increase its control capabilities over telecoms networks, which could result in operators being hit with large fines if they fail to adhere to new security requirements.
In a statement, the government noted that the Telecommunications Security Bill...
BT and Toshiba have deployed an unhackable six-kilometre length of quantum encrypted fibre optic cable for transfer of highly sensitive data between different industrial facilities. It is the first deployment in the UK of a quantum-secure point-to-point fibre network, for sharing encryption ‘keys’ between...
While Wi-Fi 6 and 5G may both be secure, important questions about data ownership remain
Historically, one of Wi-Fi’s biggest drawbacks, particularly in comparison to cellular, was the level of security it could offer. Unlike Wi-Fi, wireless cellular technology has the wireless security layer as...
The pandemic has highlighted the importance of personal data and digital connectivity, to the detection, treatment, and prevention of COVID-19. The major social media platforms for search, marketing, and transactions involve the collection and use of personal data in historic proportions in ways that...
The 5G use cases span a number of different industry sectors
After speaking with over 1,000 IT decision-makers at U.S. and U.K. enterprises, Nokia released a new study called “Mapping demand: The 5G opportunity in enterprise for communications service providers,” which revealed the top five...
Comprehensive, credible, internal and external testing of all network elements is a critical component of effective, trustworthy cyber security. Independent external testing is also essential to certify compliance with industry standards by equipment vendors, network operators, and service providers.
On May 20, join us for...
The world’s rainforests are some of the most important, life-sustaining natural resources on the planet. Yet these beautiful, valuable environments are under constant threat from illicit loggers, hunters, and poachers. Fortunately, artificial intelligence (AI) technologies, combined with wireless communication, is helping to preserve and...
Boston Consulting Group (BCG) research finds the United States is the global leader of the semiconductor market, with a 45-50% market share. That leadership relies upon very large investments in R&D, which are funded by access to global markets. Chinese companies, for example, account...
The coronavirus pandemic has transformed how many around the world work, learn, and live. Now more than ever, access to secure, modern connectivity is essential to supporting and maintaining teams, communities, and other human-to-human interactions and relationships.
On April 29, join us for an inspiring...
Cyber threats have no single home country and respect no borders. This makes effective cyber security a responsibility shared by equipment vendors, software developers, users, and all other stakeholders who want, need, and depend upon secure, accessible connectivity.
This webinar will feature two cyber security...
Quectel: ‘As hackers get more sophisticated, so too will our modules’
As the number of connected devices in homes, throughout cities or within enterprises continues to increase, so do the opportunities for attacking security vulnerabilities. According to Neset Yalcinkaya, VP of Product and GM of...
LoRaWAN will work in the 2.4 GHz spectrum band, also occupied by Wi-Fi and Bluetooth systems, to enable LoRaWAN-based IoT devices to work globally at the same frequency for the first time, without needing to switch between sub-GHz bands in roaming.
That is the proposal,...
Cisco introduced an IoT security architecture that provides enhanced visibility across both IT and IoT environments, and protects processes, the networking company said in a release.
Cisco said its new solutions enable the collection and extraction of data from the IoT edge, so organizations can...
As 5G moves beyond enhanced mobile broadband, the importance of cell site routers as RAN service nodes comes into sharp focus
The current thrust of 5G network deployments is offering up a consumer-facing enhanced mobile broadband experience. This, in and of itself, involves operators deploying...
As the underlying technology that comprises 5G has developed, a variety of industry groups, working hand-in-hand with national and international regulatory agencies, have collaborated to ensure global scalability of the next generation of cellular. This unified approach, as with previous generations of technology, is...
By its very nature, 5G is complex. Next generation networks are going live all over the globe and operators are working in earnest to secure the capital dollars needed to scale 5G, continue to enhance the technology and deliver cutting-edge consumer and enterprise services.
This...
Cloudification of IoT accelerates
Philippe Guillemette, chief technology officer, Sierra Wireless:
“The complexities that companies experience building out and maintaining IoT infrastructure has hindered growth of the sector, leading to the failure of as many as 75 per cent of IoT projects.
“However, in 2020, we will see an...
Ajay Rane, vice president for global business development, Sigfox:
The IoT, and the networks that devices run on, are poised for growth and maturity in 2020. Key to this will be an expansion in network coverage, as well as a reduction in the cost of...