YOU ARE AT:TagsSecurity

BROWSING: Security

Three steps you can take now for more secure mobile IoT (Reader Forum)

The Cisco Visual Networking Index reports that almost half a billion (429 million) mobile devices and connections were added in 2016. Smartphones made up the bulk of this growth, followed by M2M modules. These devices, self-driving cars, mobile-connected tablets and more comprise the mobile internet...

Which companies are most vulnerable to IoT hacks?

Mid-size companies are embracing the internet of things, but are not always implementing security measures to protect their data. One in eight has been the victim of a cyber attack related to the IoT, according to a new study commissioned by Arctic Wolf, a...

HPE software business completes $8.8 billion Micro Focus merger

HPE and Micro Focus merge to create world’s seventh largest software vendor Hewlett Packard Enterprise (HPE) announced it completed a $8.8 billion spin-off and merger with U.K. software businesses Micro Focus Friday, claiming to now be seventh-largest software vendor in the world. The companies will...

Verizon secures its virtual network services with Check Point

Verizon expands its software-defined ecosystem by integrating another security tool Verizon Communications is offering another security component to its virtual network services platform with the addition of Check Point Software Technologies. Verizon has become more and more concerned with securing its virtual service line, and it’s...

Kaspersky Lab launches IoT scanner

The IoT launch occurs while the FBI is reportedly urging U.S. firms to stop using Kapersky Lab’s security solutions Kaspersky Lab has released a beta version of its solution for the smart home and the internet of things (IoT) - Kaspersky IoT Scanner. This free...

Which team member is your company’s biggest mobile security risk? (Reality Check)

The workforce of the future will be more mobile than ever. By 2020, 40% of the global workforce will be mobile. In the U.S. and Europe, that number will soar to 75%. The changing composition of the modern workforce accelerates the need for mobile...

Stages of a cyber attack

Virtual networks: a bullseye for hackers Virtualization of networks are on the rise as are cyber attacks. According to a report by FireEye and Mandiant, approximately 97% of organizations have had at least one hacker bypass there defense architecture. Moreover, network security devices like next...

Congress tries to legislate IoT security

In an effort to protect the U.S. government from hackers, a group of senators has introduced a bill that would legislate specific security measures for all connected hardware purchased by government agencies. The bill is called the Internet of Things (IoT) Cybersecurity Improvement Act...

SoftBank subsidiaries partner with Rambus for IoT security

Security solution could enhance SoftBank's growing portfolio of IoT investments SoftBank Technologies is partnering with Rambus in an effort to bolster IoT security and device management. Rambus makes semiconductors and IP cores for memory chips, security solutions, smart sensors and lighting products. The company said...

Top 3 smart cities in APAC

The Asia Pacific (APAC) region has several smart cities under development, mainly grouped in countries such as China, Japan, South Korea and Singapore. Here we describe three of the region’s most developed smart city projects. Yinchuan The city of Yinchuan, China, is known to be the...

How to secure the IoT

More than 50 billion devices are predicted to be used by consumers by the year 2020, according to industry analysts and high-tech companies. However, this forecasted boom in the internet of things (IoT) will require the implementation of security measures to protect the entire...

Embedded IoT design: six best practices

Embedding sensors, connectivity and compute capabilities into assets that have never before been connected to the internet is difficult. Enterprise IoT Insights spoke with analysts, chip developers, wireless carriers and module makers to learn about some of the best practices identified by these companies....

Keysight and Ixia: “It’s a good fit”

Keysight acquisition presents a new path for Ixia Almost three years after Bethany Mayer took the helm at Ixia, the company has been acquired by Keysight Technologies. The $1.6 billion transaction closed in April, and now the former Ixia CEO will be using her experience...

IoT security: will today’s methods work?

Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...

IoT security: will today’s methods work?

Researchers from the University of Michigan and Stony Brook University have published a paper calling for new security mechanisms for the internet of things. The authors say that some security challenges presented by the IoT can be solved using traditional approaches, and some require...

Study: 48% of U.S. firms using IoT hit by security breaches

The report also showed that IoT breaches can cost up to 13% of the smaller firms´ annual revenues Nearly half of U.S. firms using an internet of things (IoT) network have been hit by a recent security breach, according to a study by consulting firm...

SD-WAN market poised for growth

Survey shows interest in SD-WAN market The software-defined Wide Area Network market is poised for 200% growth in the next 12 months, according to a new report from Cato Networks. In a survey of more than 350 IT professionals, Cato found that nearly a third of...

With revenue down, Cisco plans to cut 1,100 jobs

Wireless and security led Cisco revenues in Q3 2017 Networking vendor Cisco reported its quarterly financial results this week, showing revenue down for the quarter with an outlook of further declines. To help save money, the company will cut 1,100 jobs. This latest round of cuts...

What is an IoT gateway?

 An internet of things (IoT) gateway is a device that connects IoT devices, equipment systems, sensors and the cloud. By connecting the devices in the field and a centralized cloud, the IoT gateway offers local processing and storage solutions, as well as the ability to autonomously...

Michael Dell: With digital transformation, security is ‘greatest concern’

Dell founder says IoT, cloud, workforce and security are all part of digital transformation LAS VEGAS--Michael Dell, the founder and CEO of the Austin-based tech powerhouse, shared key takeaways of his regular conversations with the CEOs and CIOs of customers during his opening session at...

Keeping it Local: Enterprises Secure IoT Data with Private LTE Networks

LTE is the gold standard of connectivity, but many enterprises do not consider it an option when planning private networks to connect equipment to the internet. That’s a mistake, according to Qualcomm Technologies VP of business development Neville Meijers. Meijers said enterprises should consider...

Achieving data integrity and security

Panel discussion: Achieving data integrity and security Moderator Dr Homaira Akbari, Board member, Gemalto and President of AKnowledge Partners is joined by John Allen, Sr. Solution Architect - Service Provider Business Development, F5 Networks; Brent Messer, CIO, Chattanooga.Gov, Jim Allison, Manager of Planning, Capitol Corridor Joint Powers Authority...

Reality Check: CSPs need to take a leadership role in securing IoT

Recent attacks show IoT devices are vulnerable, but what role to CSPs play in ensuring customer security? Editor’s Note: The RCR Wireless News Reality Check section is where C-level executives and advisory firms from across the mobile industry share unique insights and experiences. Communications...

Reader Forum: Using big data to combat DDoS security threats

Kentik looks at how telecom operators can use big data in their DDoS security platforms. Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We...