BROWSING: Security
Feature Report: Securing mobility and cloud in the age of analytics
Consumer demand for mobile connectivity and cloud-based platforms has resulted in mobile networks transmitting more data than ever, which puts carriers in a prime spot to use analytics in order to glean insight into what is actually moving across their networks. However, growing demand...
AT&T on smart hospitals: challenges and benefits of health care IoT
Smart hospitals, AT&T and IoT
Nadia Morris, head of innovation at the AT&T Connected Health Foundry in Houston, presided over a session titled “Connecting smart hospitals with care at home” at this year’s TMForum Innovation InFocus conference. Morris highlighted problems in the health care industry,...
AT&T on smart hospitals: challenges and benefits of health care IoT
Smart hospitals, AT&T and IoT
Nadia Morris, head of innovation at the AT&T Connected Health Foundry in Houston, presided over a session titled “Connecting smart hospitals with care at home” at this year’s TMForum Innovation InFocus conference. Morris highlighted problems in the health care industry,...
Apple refreshes MacBook Pro line with Touch Bar, Air left for dead
Apple on Thursday released a new MacBook Pro design, the first time the model line has seen a refresh in four years. The company has all but killed off its popular MacBook Air line of portable computers, replacing it with the 13-inch version of the...
Apple refreshes Macbook Pro line with Touch Bar, Air left for dead
Apple on Thursday released a new Macbook Pro design, the first time it has seen a refresh in four years. It has all but killed off its popular Air line of ultra-portable computers, replacing it with the 13-inch version of the Macbook Pro or 12-inch...
Bastille releases IoT security solution to protect enterprises from attacks
Bastille, which focuses on security for enterprise "internet of things" deployments, announced a new solution that uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security. The services is designed to enable the ability to sense,...
Bastille releases IoT security solution to protect enterprises from attacks
Bastille, an enterprise IoT security company, announced the availability of its new service to protect internet of things enterprises from information and security threats. Bastille’s solution uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security....
Looking beyond fingerprint sensors: ways to enhance smartphone security
The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure log in authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have...
Looking beyond fingerprint sensors: ways to enhance smartphone security
The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...
Qualcomm’s new camera platforms enable virtual reality, IoT
HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at its 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics,...
Qualcomm’s new camera platforms enable virtual reality, IoT
HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at the 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics, 4K High...
Reader Forum: Smart fraud scores help CSPs onboard customers, stop ‘fraudsters’
Fraud remains a significant risk for communication service providers, but the right tools can help prevent issues and speed up the onboarding of new customers
Today’s business environment is fraught with identity theft, data breaches and overall fraud exposure. Communications service providers are particularly vulnerable to...
Feature Report: Testing the Internet of Things – Making the IoT Work
As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different.
RCR...
Feature Report: Testing the internet of things – making the IoT work
As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different.
RCR...
AT&T strikes cloud deals with AWS, IBM targeting enterprise clients
AT&T cloud business now includes support from Amazon Web Services and deeper integration with IBM targeting enterprise customers
AT&T bolstered its cloud efforts, announcing deals with Amazon Web Services and IBM.
The multiyear deal with AWS calls for the delivery of integrated solutions using each company’s...
Analyst Angle: Yahoo hack – what this means to the enterprise
Connected to the Yahoo hack, can users protect themselves from future attacks and will it affect the sale to Verizon/AOL?
I think you’d have to have been living in a cave if you didn’t see any online news stories or live TV news broadcasts about...
IIC releases official framework for industrial IoT security
Securing the industrial IoT
The Industrial Internet Consortium, an organization formed to accelerate the industrial "internet of things," today published the Industrial Internet Security Framework, a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five IIoT characteristics: safety,...
IIC releases official framework for industrial IoT security
Securing the industrial IoT
The Industrial Internet Consortium (IIC), an organization formed to accelerate the industrial internet of things (IIoT), today published the Industrial Internet Security Framework (IISF), a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five...
Reader Forum: For CSPs IoT, NFV and SDN is era of growing opportunity and risks
As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge
This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...
Cisco and Zones protect beer with connected distribution center
Saving money and creating a connected beer center
Del Papa is a beer distribution company founded more than a century ago, and the company today distributes 10 million cases of beer annually from 30 suppliers. More than 375 employees work at their headquarters in Texas City,...
Case Study: Lockheed Martin uses big data for F-35 maintenance
Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium
The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...
Case Study: Lockheed Martin uses big data for F-35 maintenance
Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium
The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...
Reality Check: Security industry must embrace modern PTT technologies
Can the use of IP-based PTT platforms allow for a more profitable, secure and efficient working environment in the security space?
The global security industry is growing at a rapid pace. More professional and coordinated operations across disciplines and geographical borders among criminals is one...
Here is what companies are doing to secure the IIoT
IIoT security: critical importance, under-addressed
The industrial internet of things presents a cybersecurity concern of a scale we have never before seen. Its premise alone – making every "thing" around us connected to a network – is enough to spur the imagination of entire environments...