YOU ARE AT:TagsSecurity

BROWSING: Security

Cisco intros new IoT security architecture

  Cisco introduced an IoT security architecture that provides enhanced visibility across both IT and IoT environments, and protects processes, the networking company said in a release. Cisco said its new solutions enable the collection and extraction of data from the IoT edge, so organizations can...

From security to slicing, cell site routers are key to 5G success

  As 5G moves beyond enhanced mobile broadband, the importance of cell site routers as RAN service nodes comes into sharp focus The current thrust of 5G network deployments is offering up a consumer-facing enhanced mobile broadband experience. This, in and of itself, involves operators deploying...

How to develop 5G security standards at a global scale

  As the underlying technology that comprises 5G has developed, a variety of industry groups, working hand-in-hand with national and international regulatory agencies, have collaborated to ensure global scalability of the next generation of cellular. This unified approach, as with previous generations of technology, is...

How should stakeholders work together to ensure 5G security?

  By its very nature, 5G is complex. Next generation networks are going live all over the globe and operators are working in earnest to secure the capital dollars needed to scale 5G, continue to enhance the technology and deliver cutting-edge consumer and enterprise services.  This...

Sierra Wireless on 2020: IoT integration, sub-6GHz 5G, Industry 4.0

  Cloudification of IoT accelerates Philippe Guillemette, chief technology officer, Sierra Wireless:  “The complexities that companies experience building out and maintaining IoT infrastructure has hindered growth of the sector, leading to the failure of as many as 75 per cent of IoT projects. “However, in 2020, we will see an...

Sigfox on 2020: Three key areas for growth and democratization of IoT

  Ajay Rane, vice president for global business development, Sigfox: The IoT, and the networks that devices run on, are poised for growth and maturity in 2020. Key to this will be an expansion in network coverage, as well as a reduction in the cost of...

What you should and should not do when using a public Wi-Fi

  Nowadays, there is almost no coffee shop, restaurant, or public library that does not offer public Wi-Fi for its clients to check their emails, post on Instagram or browse for things on the Internet. While this is mostly perceived as good customer service, public...

Kaspersky detects 105 million attacks on IoT devices globally in H1

Global cybersecurity specialist Kaspersky said that it has detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. The company highlighted that this figure is seven times more than the number found in H1...

US senators say the FBI could provide more evidence over Huawei theats

Letter to Microsoft lists off Huawei "evidence" A group of Republican senators sent a letter to Microsoft President Brad Smith stating that the FBI could share classified information with U.S. companies demonstrating threats the Chinese vendor Huawei poses to national security. The letter comes after Smith complained last...

U.S government urges India not to use Huawei gear in 5G networks: Report

India apparently latest focus of U.S. 5G influence campaign The U.S. government urged Indian authorities not to use telecom gear from Chinese vendor Huawei in the country’s future 5G networks as the Trump administration continues its trade war with Beijing, the Financial Times reported. Last week,...

Differences of trust and security in IT and OT systems – and their interplay in IIoT

Hats off to the Industrial Internet Consortium (IIC), which continues to publish comprehensive and constructive guides on how to design, deploy, and manage digital change systems in highly individualistic ‘vertical’ sectors, as part of this broader Industrie 4.0 concept. Its recent publication, Managing and Assessing...

Huawei White Paper: Partnering with the Industry for 5G Security Assurance

With the evolution of telecommunications networks and introduction of 5G technologies industry stakeholders, governments and partners must to work together to address the challenges with securing these modern telecommunications networks through risk-based approaches to cyber security. The white paper discusses some of the fundamental...

Huawei Webinar: 5G – Partnering for Security

Based on Huawei’s recent 5G Security Whitepaper the panel will discuss 5G security approaches to risk mitigation and management with 5G infrastructure while dispelling myths and misconceptions about the security of 5G as a whole. The panel will cover support of cyber resilience and recommendations...

UK to send delegation to the US to seek clarity on Huawei’s ban: Report

  The U.K. government is planning to send a delegation to the U.S. to get additional details on how President Donald Trump’s decision to place Chinese vendor Huawei on an export blacklist would affects companies overseas, Bloomberg reported, citing a source familiar with the matter. The...

ZTE opens cybersecurity laboratory in Italy

  Chinese vendor ZTE Corporation has officially launched its cybersecurity laboratory in Rome, Italy. The vendor said that the establishment of the cybersecurity laboratory in Italy is an important measure for ZTE to promote transparency and enhance mutual trust with all third parties. ZTE also said that...

ZTE opens cybersecurity lab in China

Chinese vendor ZTE announced the launch of its first cybersecurity lab in Nanjing, China.  ZTE said that the opening of this security lab will contribute with its goal of increasing transparency. The cybersecurity lab aims to provide global customers, regulators and other stakeholders...

Telefonica launches new unit to focus on IoT security

Spanish telecom giant Telefónica has launched the IoT Cybersecurity Unit, a new project focused on the securing the internet of things, the telco said in a release. The new unit combines the company’s capabilities in both the cybersecurity and IoT fields. Telefonica’s IoT Cybersecurity Unit will have the...

How 2FA can be hacked using social engineering

Many services today use two-factor authentication (2FA) to improve the security of user accounts. In most cases, 2FA utilizes a password and a code sent via SMS or email as the two factors of verification. Compared to the password-only approach, 2FA is significantly stronger...

Commercial drones pose cybersecurity threats, study finds

Ben-Gurion Unversity and Fujitsu said the lack of supporting technology could be exploited by malicious entities for cyberattacks, terrorism and crime The growing popularity of personal and commercial drone use in populated areas poses significant risks both for society and drones due to the lack...

Infineon unveils new TPM module as “answer to digital factory security”

Infineon Technologies has released a new ‘trusted platform module’ (TPM) to protect data in industrial PCs, servers, industrial controllers, and edge gateways. Its new OPTIGA TPM SLM 9670 controls access to key data within a digital factory functions, as well as their interface to...

European Commission makes recommendations on 5G network security

  The commission said that member states will be able to exclude vendors over security allegations The European Commission has recommended a number of operational steps and measures to ensure a high level of cybersecurity for 5G networks across the European Union. The EC's recommendations for member...

Merkel confirms Germany is not planning to exclude Huawei from 5G deals

  The German government said that excluding the Chinese vendor would represent a challenge for local operators participating in a 5G auction Germany’s Chancellor Angela Merkel has reiterated that the government is not planning to exclude Chinese vendor Huawei from 5G contracts in the country, international...

Germany to define its own 5G security standard, Merkel says

The German government said it will discuss security concerns with key European partners and government officials in the U.S.   Germany expects to define its own security standards for the deployment of 5G infrastructure, international press reported Chancellor Angela Merkel as saying. This development comes days after...

European Parliament urges states to take action against Chinese 5G threat

  The Parliament said European states should develop guidance on how to tackle cyber threats when procuring 5G equipment The European Parliament has passed a resolution calling for the European Union to take action on potential security threats linked to China's growing technological presence in Europe,...