YOU ARE AT:TagsSecurity

BROWSING: Security

Stages of a cyber attack

Virtual networks: a bullseye for hackers Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...

Congress tries to legislate IoT security

In an effort to protect the U.S. government from hackers, a group of senators has introduced a bill that would legislate specific security measures for all connected hardware purchased by government agencies. The bill is called the Internet of Things (IoT) Cybersecurity Improvement Act...

SoftBank subsidiaries partner with Rambus for IoT security

Security solution could enhance SoftBank's growing portfolio of IoT investments SoftBank Technologies is partnering with Rambus in an effort to bolster IoT security and device management. Rambus makes semiconductors and IP cores for memory chips, security solutions, smart sensors and lighting products. The company said...

Top 3 smart cities in APAC

The Asia Pacific (APAC) region has several smart cities under development, mainly grouped in countries such as China, Japan, South Korea and Singapore. Here we describe three of the region’s most developed smart city projects. Yinchuan The city of Yinchuan, China, is known to be the...

How to secure the IoT

More than 50 billion devices are predicted to be used by consumers by the year 2020, according to industry analysts and high-tech companies. However, this forecasted boom in the internet of things (IoT) will require the implementation of security measures to protect the entire...

Embedded IoT design: six best practices

Embedding sensors, connectivity and compute capabilities into assets that have never before been connected to the internet is difficult. Enterprise IoT Insights spoke with analysts, chip developers, wireless carriers and module makers to learn about some of the best practices identified by these companies....

Keysight and Ixia: “It’s a good fit”

Keysight acquisition presents a new path for Ixia Almost three years after Bethany Mayer took the helm at Ixia, the company has been acquired by Keysight Technologies. The $1.6 billion transaction closed in April, and now the former Ixia CEO will be using her experience...

IoT security: will today’s methods work?

Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...

IoT security: will today’s methods work?

Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...

Study: 48% of U.S. firms using IoT hit by security breaches

The report also showed that IoT breaches can cost up to 13% of the smaller firms´ annual revenues Nearly half of U.S. firms using an internet of things (IoT) network have been hit by a recent security breach, according to a study by consulting firm...

SD-WAN market poised for growth

Survey shows interest in SD-WAN market The software-defined Wide Area Network market is poised for 200% growth in the next 12 months, according to a new report from Cato Networks. In a survey of more than 350 IT professionals, Cato found that nearly a third of...

With revenue down, Cisco plans to cut 1,100 jobs

Wireless and security led Cisco revenues in Q3 2017 Networking vendor Cisco reported its quarterly financial results this week, showing revenue down for the quarter with an outlook of further declines. To help save money, the company will cut 1,100 jobs. This latest round of cuts...

What is an IoT gateway?

 An internet of things (IoT) gateway is a device that connects IoT devices, equipment systems, sensors and the cloud. By connecting the devices in the field and a centralized cloud, the IoT gateway offers local processing and storage solutions, as well as the ability to autonomously...

Michael Dell: With digital transformation, security is ‘greatest concern’

Dell founder says IoT, cloud, workforce and security are all part of digital transformation LAS VEGAS--Michael Dell, the founder and CEO of the Austin-based tech powerhouse, shared key takeaways of his regular conversations with the CEOs and CIOs of customers during his opening session at...

Keeping it Local: Enterprises Secure IoT Data with Private LTE Networks

LTE is the gold standard of connectivity, but many enterprises do not consider it an option when planning private networks to connect equipment to the internet. That’s a mistake, according to Qualcomm Technologies VP of business development Neville Meijers. Meijers said enterprises should consider...

Achieving data integrity and security

Panel discussion: Achieving data integrity and security Moderator Dr Homaira Akbari, Board member, Gemalto and President of AKnowledge Partners is joined by John Allen, Sr. Solution Architect - Service Provider Business Development, F5 Networks; Brent Messer, CIO, Chattanooga.Gov, Jim Allison, Manager of Planning, Capitol Corridor Joint Powers Authority...

Reality Check: CSPs need to take a leadership role in securing IoT

Recent attacks show IoT devices are vulnerable, but what role to CSPs play in ensuring customer security? Editor’s Note: The RCR Wireless News Reality Check section is where C-level executives and advisory firms from across the mobile industry share unique insights and experiences. Communications...

Reader Forum: Using big data to combat DDoS security threats

Kentik looks at how telecom operators can use big data in their DDoS security platforms. Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We...

Enterprise IoT Summit to showcase trends including security

New Gartner report calls lists IoT technologies 'that should be on every organization's radar' including security In a new report, Gartner Inc., an IT research and advisory firm, identifies 10 internet of things technologies it expects to broadly impact businesses in 2017 and 2018. Gartner...

Reader Forum: 5 examples why IoT devices need a voice

Gemalto looks at five scenarios regarding IoT device security that need to be addressed. Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless...

AT&T SVP of IoT highlights the importance of security at Mobile World Congress

Chris Penrose: For IoT, 'security is paramount.' In an interview with RCR Wireless News during Mobile World Congress 2017, AT&T SVP of IoT Chris Penrose highlighted the fundamental importance of securing the fast-growing internet of things. "Security is paramount. It's the No. 1...

Reader Forum: Operators must think security first to prevent catastrophic network breaches

Telecom networks operate in two different planes: the user plane and the control plane. The user plane – also known as the “bearer” plane – is where all user data (voice, data, video) is carried. The networks manage user sessions and authenticate devices and...

Re-set Your Expectations for Distributed Site Networking

Security and high-speed requirements set new standards for performance. Are you tired of being dogged by poor network performance or security issues at your branch offices, self-service kiosks and digital media displays, or on tablets and smartphones? If you’re managing multiple sites, the frustration multiplies...

IoT security: Gemalto fills the gaps

Security has been called the internet of things’ Achilles heel, and with good reason. Even when IoT connections use the most secure wireless networks, data can be vulnerable at both endpoints of a connection. Unlike smartphone data, IoT data doesn’t always start and end...