YOU ARE AT:TagsSecurity

BROWSING: Security

Five top 5G use cases for enterprises, according to Nokia

The 5G use cases span a number of different industry sectors After speaking with over 1,000 IT decision-makers at U.S. and U.K. enterprises, Nokia released a new study called “Mapping demand: The 5G opportunity in enterprise for communications service providers,” which revealed the top five...

Huawei Webinar: Cybersecurity Standards and Testing in Europe

Comprehensive, credible, internal and external testing of all network elements is a critical component of effective, trustworthy cyber security. Independent external testing is also essential to certify compliance with industry standards by equipment vendors, network operators, and service providers. On May 20, join us for...

Huawei Webinar: TECH4ALL / Saving the Rainforests with Artificial Intelligence

  The world’s rainforests are some of the most important, life-sustaining natural resources on the planet. Yet these beautiful, valuable environments are under constant threat from illicit loggers, hunters, and poachers. Fortunately, artificial intelligence (AI) technologies, combined with wireless communication, is helping to preserve and...

Huawei Webinar: The Significance of the Semiconductor Industry in the US

  Boston Consulting Group (BCG) research finds the United States is the global leader of the semiconductor market, with a 45-50% market share. That leadership relies upon very large investments in R&D, which are funded by access to global markets. Chinese companies, for example, account...

Huawei Webinar: COVID-19, Connectivity and Community

  The coronavirus pandemic has transformed how many around the world work, learn, and live. Now more than ever, access to secure, modern connectivity is essential to supporting and maintaining teams, communities, and other human-to-human interactions and relationships. On April 29, join us for an inspiring...

Huawei Webinar: 5G Security – A Shared Responsibility

  Cyber threats have no single home country and respect no borders. This makes effective cyber security a responsibility shared by equipment vendors, software developers, users, and all other stakeholders who want, need, and depend upon secure, accessible connectivity. This webinar will feature two cyber security...

The security of a device starts with its main building blocks: its cellular module

  Quectel: ‘As hackers get more sophisticated, so too will our modules’ As the number of connected devices in homes, throughout cities or within enterprises continues to increase, so do the opportunities for attacking security vulnerabilities. According to Neset Yalcinkaya, VP of Product and GM of...

LoRaWAN enters 2.4 GHz – plus new space race, network sharing, embedded security

LoRaWAN will work in the 2.4 GHz spectrum band, also occupied by Wi-Fi and Bluetooth systems, to enable LoRaWAN-based IoT devices to work globally at the same frequency for the first time, without needing to switch between sub-GHz bands in roaming.  That is the proposal,...

Cisco intros new IoT security architecture

  Cisco introduced an IoT security architecture that provides enhanced visibility across both IT and IoT environments, and protects processes, the networking company said in a release. Cisco said its new solutions enable the collection and extraction of data from the IoT edge, so organizations can...

From security to slicing, cell site routers are key to 5G success

  As 5G moves beyond enhanced mobile broadband, the importance of cell site routers as RAN service nodes comes into sharp focus The current thrust of 5G network deployments is offering up a consumer-facing enhanced mobile broadband experience. This, in and of itself, involves operators deploying...

How to develop 5G security standards at a global scale

  As the underlying technology that comprises 5G has developed, a variety of industry groups, working hand-in-hand with national and international regulatory agencies, have collaborated to ensure global scalability of the next generation of cellular. This unified approach, as with previous generations of technology, is...

How should stakeholders work together to ensure 5G security?

  By its very nature, 5G is complex. Next generation networks are going live all over the globe and operators are working in earnest to secure the capital dollars needed to scale 5G, continue to enhance the technology and deliver cutting-edge consumer and enterprise services.  This...

Sierra Wireless on 2020: IoT integration, sub-6GHz 5G, Industry 4.0

  Cloudification of IoT accelerates Philippe Guillemette, chief technology officer, Sierra Wireless:  “The complexities that companies experience building out and maintaining IoT infrastructure has hindered growth of the sector, leading to the failure of as many as 75 per cent of IoT projects. “However, in 2020, we will see an...

Sigfox on 2020: Three key areas for growth and democratization of IoT

  Ajay Rane, vice president for global business development, Sigfox: The IoT, and the networks that devices run on, are poised for growth and maturity in 2020. Key to this will be an expansion in network coverage, as well as a reduction in the cost of...

What you should and should not do when using a public Wi-Fi

  Nowadays, there is almost no coffee shop, restaurant, or public library that does not offer public Wi-Fi for its clients to check their emails, post on Instagram or browse for things on the Internet. While this is mostly perceived as good customer service, public...

Kaspersky detects 105 million attacks on IoT devices globally in H1

Global cybersecurity specialist Kaspersky said that it has detected 105 million attacks on IoT devices coming from 276,000 unique IP addresses in the first six months of the year. The company highlighted that this figure is seven times more than the number found in H1...

US senators say the FBI could provide more evidence over Huawei theats

Letter to Microsoft lists off Huawei "evidence" A group of Republican senators sent a letter to Microsoft President Brad Smith stating that the FBI could share classified information with U.S. companies demonstrating threats the Chinese vendor Huawei poses to national security. The letter comes after Smith complained last...

U.S government urges India not to use Huawei gear in 5G networks: Report

India apparently latest focus of U.S. 5G influence campaign The U.S. government urged Indian authorities not to use telecom gear from Chinese vendor Huawei in the country’s future 5G networks as the Trump administration continues its trade war with Beijing, the Financial Times reported. Last week,...

Differences of trust and security in IT and OT systems – and their interplay in IIoT

Hats off to the Industrial Internet Consortium (IIC), which continues to publish comprehensive and constructive guides on how to design, deploy, and manage digital change systems in highly individualistic ‘vertical’ sectors, as part of this broader Industrie 4.0 concept. Its recent publication, Managing and Assessing...

Huawei White Paper: Partnering with the Industry for 5G Security Assurance

With the evolution of telecommunications networks and introduction of 5G technologies industry stakeholders, governments and partners must to work together to address the challenges with securing these modern telecommunications networks through risk-based approaches to cyber security. The white paper discusses some of the fundamental...

Huawei Webinar: 5G – Partnering for Security

Based on Huawei’s recent 5G Security Whitepaper the panel will discuss 5G security approaches to risk mitigation and management with 5G infrastructure while dispelling myths and misconceptions about the security of 5G as a whole. The panel will cover support of cyber resilience and recommendations...

UK to send delegation to the US to seek clarity on Huawei’s ban: Report

  The U.K. government is planning to send a delegation to the U.S. to get additional details on how President Donald Trump’s decision to place Chinese vendor Huawei on an export blacklist would affects companies overseas, Bloomberg reported, citing a source familiar with the matter. The...

ZTE opens cybersecurity laboratory in Italy

  Chinese vendor ZTE Corporation has officially launched its cybersecurity laboratory in Rome, Italy. The vendor said that the establishment of the cybersecurity laboratory in Italy is an important measure for ZTE to promote transparency and enhance mutual trust with all third parties. ZTE also said that...

ZTE opens cybersecurity lab in China

Chinese vendor ZTE announced the launch of its first cybersecurity lab in Nanjing, China.  ZTE said that the opening of this security lab will contribute with its goal of increasing transparency. The cybersecurity lab aims to provide global customers, regulators and other stakeholders...