YOU ARE AT:TagsSecurity

BROWSING: Security

Sprint, Vodafone call on Arm to embed and secure IoT connectivity

Operators Sprint and Vodafone have backed Arm’s integrated SIM (iSIM) technology to help the internet-of-things (IoT) market reach scale. Sprint confirmed it is working with fellow Softbank companies Arm and Packet on its new IoT platform, announced last week. Swedish vendor Ericsson has been handed...

Turkcell in talks with telcos to share digital transformation know-how: CEO

The Turkish operator said it is in talks with nearly 30 companies from all over the world to discuss ways to create digital economies MUNICH, GERMANY--Turkish mobile operator Turkcell is currently having talks with about 30 different operators with the main aim of sharing the...

Cisco expects large investments in 5G to occur in 2020, CEO says

Cisco’s revenues for fiscal Q4 were up 6% year-on-year Cisco foresees large investments by telecom operators in 5G technologies in 2020, the company’s CEO Chuck Robbins said on a conference call with investors. “We expect that is still a year out before many will start ...

Five ways Sigfox alarms are helping farmers fight robbers, rustlers and vandals

Low-power wide-area (LPWA) networks like Sigfox are providing the platform for internet-of-thing (IoT) based alarm systems that are cheap and easy to install. They also provide coverage to rural areas, which 3G and 4G based alarm systems struggle to cover. Rural crime is a growing...

Trump signs defense bill banning US agencies from buying tech from Huawei, ZTE

  The Chinese government said it will review the impact of the measure U.S. President Donald Trump has signed the National Defense Authorization Act, or NDAA, which includes new regulations that ban government agencies doing business with Chinese vendors Huawei and ZTE. The bill prohibits the U.S....

IBM X-Force Red, Threatcare warn about smart city vulnerabilities

The team of researches have tested smart city systems from Libelium, Echelon and Battelle   A team of researchers from Threatcare and IBM X-Force Red have joined forces to test several smart city devices, with the specific goal of finding vulnerabilities in smart city systems. Earlier this...

AI and 5G go hand-in-hand for network operations

As network attacks get more sophisticated, AI can help with threat detection As it continues to develop, 5G will become increasingly complex. The need to deploy virtualized, programmable infrastructure becomes more pressing as new bandwidth-consuming enterprise, industrial and consumer applications hit the market. And, in...

Blockchain for the supply chain: great in theory, hard in practice, says food industry

The practicalities of implementing decentralised blockchain governance, and the fear it raises within the supply chain about a lack of control, remain major stumbling blocks for the technology, said a panel from the food industry at Blockchain Expo in Amsterdam. The distributed ledger technology remains...

Sprint, NXM Labs connected car platform sports blockchain security

Sprint will add NXM's blockchain security technology into its connected car module due out in fall. Cars, like any device with chips embedded and connected to the outside word, can be hacked. It’s happened since 2015, when two engineers famously hacked a Jeep Cherokee. Since...

Key challenges of visual fog computing

To understand visual fog computing, it is important to first understand fog computing. Let’s take a look at how the physical world connects to the cloud. Think of the physical world at the bottom of a pyramid, and the cloud as the top. At the...

7 IoT product design best practices

Regardless of the hyperbole constantly hammered home by marketing departments, IoT as a tangible entity is embryonic. We’re at the very early stages of the IoT learning curve, so it should be no surprise that the success rate for IoT adopters has been in...

How to design an enterprise IoT system

Perhaps the most succinct definition of the internet of things comes from an April 26, 2018 blog by Sharada Prahladrao of ARC: ”Everyone, everywhere is connected to everything.” With that broad a definition (and appeal), it’s no surprise that it’s spreading into many areas....

Five IoT embedded design best practices

The Internet of Things (IoT) promises big market potential and infinite opportunities, but success is not guaranteed. A study done by Cisco showed that only 26% of all IoT projects come to fruition. By applying these five best practices in embedded design, you will...

Three reasons why three-quarters of IIoT projects fail, according to Cisco

Three quarters of enterprise-based ‘internet of things’ (IoT) projects are failing, reckons US networking specialist Cisco. This is an alarming statistic, especially when considered in the context of the head-spinning growth of new IoT deployments. Analyst house IDC calculates the total base of installed IoT...

Rockwell joins Bosch, Cisco and Schneider to develop OPC-UA comms standard

US firm Rockwell Automation is heading a team of industrial automation specialists and solution providers to create a new communication solution based on the OPC-UA protocol for real-time and sensor-to-cloud applications. ABB, Belden, Bosch Rexroth, B&R, Cisco, Hilscher, KUKA, National Instruments, Parker Hannifin, Phoenix Contact,...

#TBT: Enterprise + wireless web; PDAs > laptops … this week in 2000

Editor’s Note: RCR Wireless News goes all in for “Throwback Thursdays,” tapping into our archives to resuscitate the top headlines from the past. Fire up the time machine, put on the sepia-tinted shades, set the date for #TBT and enjoy the memories! Figuring out the...

Analyst Angle: The “race to the bottom” security problem of IoT

The good news The Internet of Things is just beginning to take off, and the growth is happening separately in both the consumer and smart home space, as well as in vertical and industrial markets like cities, factories, campuses, and worksites. McKinsey Global Institute estimates...

Microsoft intros triple lock to secure IoT devices at the network edge

Microsoft has announced a new platform to secure ‘internet of things’ (IoT) devices. Dubbed Azure Sphere, it layers in three levels of enhanced IoT security, in its chip, operating system (OS) and cloud. Most significantly, Microsoft has introduced a new “cross-over class” of chip, or...

Regulatory concern over ZTE spreads to U.K.

ZTE singled out as a national security concern in U.K. Chinese telecom infrastructure, smartphone and technology companies Huawei and ZTE are currently the focus of significant federal-level interest in the United States. There are bills in the US House and Senate that, if passed, would...

FCC committee warns of diameter signaling network vulnerabilities

Diameter signaling has similar vulnerabilities as SS7 Location tracking, interception of voice and text messages, denial of service and account fraud are all potential attack vectors associated with the Signaling System 7 protocol. And those same vulnerabilities can be applied to diameter signaling, according to...

How to secure connected vehicles

Security vulnerabilities of connected vehicles Automakers are in a race to make their vehicles more secure in an era of web-connected devices. While vehicles with internet access enable services like infotainment systems and maintenance monitoring, they also pose security risks on account of being connected...

Microsoft previews Windows Server 2019 with Linux, Kubernetes support

Microsoft gives sneak peak of Windows Server 2019 Microsoft recently previewed Windows Server 2019 with general availability slated for the second half of this year. Based on feedback from its customers, Microsoft is focused on four themes with Windows Server 2019, including hybrid, security, application...

How to manage hybrid cloud environments

When clouds collide Many organizations are looking to migrate to the cloud, but recognize the transition doesn’t happen overnight. As a result, some companies have opted for a hybrid cloud approach, which involves a combination of on-premises, private cloud and public cloud services. This allows...

Cognitive manufacturing in continuous process

What shall we call it? Cognitive manufacturing? The Industrial Internet of Things? Factory Digitization? Industry 4.0? Emerson Automation Solutions calls it the Plantweb Digital Ecosystem, and Bob Karschnia, Emerson’s VP/GM Wireless, says that while each of these terms has a slightly different meaning, in...