Virtual networks: a bullseye for hackers
Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...
In an effort to protect the U.S. government from hackers, a group of senators has introduced a bill that would legislate specific security measures for all connected hardware purchased by government agencies. The bill is called the Internet of Things (IoT) Cybersecurity Improvement Act...
Security solution could enhance SoftBank's growing portfolio of IoT investments
SoftBank Technologies is partnering with Rambus in an effort to bolster IoT security and device management. Rambus makes semiconductors and IP cores for memory chips, security solutions, smart sensors and lighting products. The company said...
The Asia Pacific (APAC) region has several smart cities under development, mainly grouped in countries such as China, Japan, South Korea and Singapore. Here we describe three of the region’s most developed smart city projects.
Yinchuan
The city of Yinchuan, China, is known to be the...
More than 50 billion devices are predicted to be used by consumers by the year 2020, according to industry analysts and high-tech companies. However, this forecasted boom in the internet of things (IoT) will require the implementation of security measures to protect the entire...
Embedding sensors, connectivity and compute capabilities into assets that have never before been connected to the internet is difficult. Enterprise IoT Insights spoke with analysts, chip developers, wireless carriers and module makers to learn about some of the best practices identified by these companies....
Keysight acquisition presents a new path for Ixia
Almost three years after Bethany Mayer took the helm at Ixia, the company has been acquired by Keysight Technologies. The $1.6 billion transaction closed in April, and now the former Ixia CEO will be using her experience...
Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...
Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...
The report also showed that IoT breaches can cost up to 13% of the smaller firms´ annual revenues
Nearly half of U.S. firms using an internet of things (IoT) network have been hit by a recent security breach, according to a study by consulting firm...
Survey shows interest in SD-WAN market
The software-defined Wide Area Network market is poised for 200% growth in the next 12 months, according to a new report from Cato Networks.
In a survey of more than 350 IT professionals, Cato found that nearly a third of...
Wireless and security led Cisco revenues in Q3 2017
Networking vendor Cisco reported its quarterly financial results this week, showing revenue down for the quarter with an outlook of further declines. To help save money, the company will cut 1,100 jobs.
This latest round of cuts...
An internet of things (IoT) gateway is a device that connects IoT devices, equipment systems, sensors and the cloud.
By connecting the devices in the field and a centralized cloud, the IoT gateway offers local processing and storage solutions, as well as the ability to autonomously...
Dell founder says IoT, cloud, workforce and security are all part of digital transformation
LAS VEGAS--Michael Dell, the founder and CEO of the Austin-based tech powerhouse, shared key takeaways of his regular conversations with the CEOs and CIOs of customers during his opening session at...
LTE is the gold standard of connectivity, but many enterprises do not consider it an option when planning private networks to connect equipment to the internet. That’s a mistake, according to Qualcomm Technologies VP of business development Neville Meijers.
Meijers said enterprises should consider...
Panel discussion: Achieving data integrity and security
Moderator Dr Homaira Akbari, Board member, Gemalto and President of AKnowledge Partners is joined by John Allen, Sr. Solution Architect - Service Provider Business Development, F5 Networks; Brent Messer, CIO, Chattanooga.Gov, Jim Allison, Manager of Planning, Capitol Corridor Joint Powers Authority...
Recent attacks show IoT devices are vulnerable, but what role to CSPs play in ensuring customer security?
Editor’s Note: The RCR Wireless News Reality Check section is where C-level executives and advisory firms from across the mobile industry share unique insights and experiences.
Communications...
Kentik looks at how telecom operators can use big data in their DDoS security platforms.
Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We...
New Gartner report calls lists IoT technologies 'that should be on every organization's radar' including security
In a new report, Gartner Inc., an IT research and advisory firm, identifies 10 internet of things technologies it expects to broadly impact businesses in 2017 and 2018. Gartner...
Gemalto looks at five scenarios regarding IoT device security that need to be addressed.
Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless...
Chris Penrose: For IoT, 'security is paramount.'
In an interview with RCR Wireless News during Mobile World Congress 2017, AT&T SVP of IoT Chris Penrose highlighted the fundamental importance of securing the fast-growing internet of things.
"Security is paramount. It's the No. 1...
Telecom networks operate in two different planes: the user plane and the control plane. The user plane – also known as the “bearer” plane – is where all user data (voice, data, video) is carried. The networks manage user sessions and authenticate devices and...
Security and high-speed requirements set new standards for performance.
Are you tired of being dogged by poor network performance or security issues at your branch offices, self-service kiosks and digital media displays, or on tablets and smartphones? If you’re managing multiple sites, the frustration multiplies...
Security has been called the internet of things’ Achilles heel, and with good reason. Even when IoT connections use the most secure wireless networks, data can be vulnerable at both endpoints of a connection. Unlike smartphone data, IoT data doesn’t always start and end...