YOU ARE AT:TagsSecurity

BROWSING: Security

Feature Report: Securing mobility and cloud in the age of analytics

Consumer demand for mobile connectivity and cloud-based platforms has resulted in mobile networks transmitting more data than ever, which puts carriers in a prime spot to use analytics in order to glean insight into what is actually moving across their networks. However, growing demand...

AT&T on smart hospitals: challenges and benefits of health care IoT

Smart hospitals, AT&T and IoT Nadia Morris, head of innovation at the AT&T Connected Health Foundry in Houston, presided over a session titled “Connecting smart hospitals with care at home” at this year’s TMForum Innovation InFocus conference. Morris highlighted problems in the health care industry,...

AT&T on smart hospitals: challenges and benefits of health care IoT

Smart hospitals, AT&T and IoT Nadia Morris, head of innovation at the AT&T Connected Health Foundry in Houston, presided over a session titled “Connecting smart hospitals with care at home” at this year’s TMForum Innovation InFocus conference. Morris highlighted problems in the health care industry,...

Apple refreshes MacBook Pro line with Touch Bar, Air left for dead

Apple on Thursday released a new MacBook Pro design, the first time the model line has seen a refresh in four years. The company has all but killed off its popular MacBook Air line of portable computers, replacing it with the 13-inch version of the...

Apple refreshes Macbook Pro line with Touch Bar, Air left for dead

Apple on Thursday released a new Macbook Pro design, the first time it has seen a refresh in four years. It has all but killed off its popular Air line of ultra-portable computers, replacing it with the 13-inch version of the Macbook Pro or 12-inch...

Bastille releases IoT security solution to protect enterprises from attacks

Bastille, which focuses on security for enterprise "internet of things" deployments, announced a new solution that uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security. The services is designed to enable the ability to sense,...

Bastille releases IoT security solution to protect enterprises from attacks

Bastille, an enterprise IoT security company, announced the availability of its new service to protect internet of things enterprises from information and security threats. Bastille’s solution uses software-defined radio sensors backed by machine-learning technology to provide enterprises with visibility into mobile, wireless and IoT security....

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure log in authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have...

Looking beyond fingerprint sensors: ways to enhance smartphone security

The Motorola Atrix 4G was the first smartphone with a fingerprint scanner for quicker, more secure login authentication. But the security feature's widespread use came about when Apple introduced it in its iPhone 5s back in 2013. Since then, Snapdragon-powered Android phones have made...

Qualcomm’s new camera platforms enable virtual reality, IoT

HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at its 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics,...

Qualcomm’s new camera platforms enable virtual reality, IoT

HONG KONG — Qualcomm announced it will support a new generation of video and imaging devices at the 4G/5G Summit. The Qualcomm Snapdragon connected camera portfolio includes a suite of camera platforms featuring hardware and software capabilities for on-camera deep learning and video analytics, 4K High...

Reader Forum: Smart fraud scores help CSPs onboard customers, stop ‘fraudsters’

Fraud remains a significant risk for communication service providers, but the right tools can help prevent issues and speed up the onboarding of new customers Today’s business environment is fraught with identity theft, data breaches and overall fraud exposure. Communications service providers are particularly vulnerable to...

Feature Report: Testing the Internet of Things – Making the IoT Work

As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different. RCR...

Feature Report: Testing the internet of things – making the IoT work

As more "things" from watches to sensors to vehicles are given connectivity, there are two fundamental goals: make sure the technology works as expected, and make sure it is secure. In different devices, the testing to ensure those two aspects can look very different. RCR...

AT&T strikes cloud deals with AWS, IBM targeting enterprise clients

AT&T cloud business now includes support from Amazon Web Services and deeper integration with IBM targeting enterprise customers AT&T bolstered its cloud efforts, announcing deals with Amazon Web Services and IBM. The multiyear deal with AWS calls for the delivery of integrated solutions using each company’s...

Analyst Angle: Yahoo hack – what this means to the enterprise

Connected to the Yahoo hack, can users protect themselves from future attacks and will it affect the sale to Verizon/AOL? I think you’d have to have been living in a cave if you didn’t see any online news stories or live TV news broadcasts about...

IIC releases official framework for industrial IoT security

Securing the industrial IoT  The Industrial Internet Consortium, an organization formed to accelerate the industrial "internet of things," today published the Industrial Internet Security Framework, a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five IIoT characteristics: safety,...

IIC releases official framework for industrial IoT security

Securing the industrial IoT  The Industrial Internet Consortium (IIC), an organization formed to accelerate the industrial internet of things (IIoT), today published the Industrial Internet Security Framework (IISF), a common IoT security framework that addresses security issues in industrial systems. The IISF emphasizes the importance of five...

Reader Forum: For CSPs IoT, NFV and SDN is era of growing opportunity and risks

As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...

Cisco and Zones protect beer with connected distribution center

Saving money and creating a connected beer center Del Papa is a beer distribution company founded more than a century ago, and the company today distributes 10 million cases of beer annually from 30 suppliers. More than 375 employees work at their headquarters in Texas City,...

Case Study: Lockheed Martin uses big data for F-35 maintenance

Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...

Case Study: Lockheed Martin uses big data for F-35 maintenance

Lockheed Martin turned to 3D technology and big data to streamline the diagnostics and maintenance processes for its F-35 and F-22 fighter planes, according to a case study provided by the Industrial Internet Consortium The F-35 Lightning II is a family of fifth-generation stealth aircraft developed...

Reality Check: Security industry must embrace modern PTT technologies

Can the use of IP-based PTT platforms allow for a more profitable, secure and efficient working environment in the security space? The global security industry is growing at a rapid pace. More professional and coordinated operations across disciplines and geographical borders among criminals is one...

Here is what companies are doing to secure the IIoT

IIoT security: critical importance, under-addressed The industrial internet of things presents a cybersecurity concern of a scale we have never before seen. Its premise alone – making every "thing" around us connected to a network – is enough to spur the imagination of entire environments...