Tag: Security

Rip and Replace Legislation is Critical to Securing the Network, says TIA

The Senate companion to the Secure and Trusted Communications Network Act is a critical step in securing our network and ensuring the integrity of the telecommunications supply chain as we usher in the 5G era. TIA applauds this decisive action to support efforts for the replacement of equipment that raises national security risks with equipment from trusted suppliers. By passing the Act, Congress is also sending a clear signal to the global industry that the U.S. will continue to lead the way on 5G security.

Protecting the Cloud From the IoT

There are billions of connected devices in use worldwide, and that number is increasing by the millions every year. Unfortunately, many of these IoT devices, as well as those currently being developed and deployed, lack critical security features, making them easy targets for hackers and botnets. Without the proper security measures in place, these devices can lead to catastrophic events.

Critical Communications Industry feels 5G has Biggest Potential to Create Safe Cities

IWCE report finds critical communications industry feels 5G has biggest potential to create Safe Cities but is still several years away from mass adoption.The report found that 76% use LTE devices and 70% are currently planning to use 5G. While it also was revealed that respondents felt 5G has the biggest potential to create safer cities above all other technologies such as AI, IoT etc. those surveyed also claimed cost and lack availability of sites to install 5G antennas were cited as the top reasons for its delayed rollout. Lack of understanding of the technology coming in third (32%) and regulation being seen as the least important barrier for rolling out 5G across America.

Cybersecurity for Smart Buildings

The increased focus on cybersecurity for smart buildings is being driven by the ever-growing number of networked IoT devices and the convergence of OT and IT security. However, this seamless interconnection of IoT devices makes smart buildings increasingly vulnerable and susceptible for cyber-attacks with expensive and destructive consequences.

How Privacy Trends Will Shape the Next Decade of IoT

The governing regulations over the use of data and who has access to it will change the landscape of how we move about in the online world .Over the past decade, data has emerged as “the new oil” – a driving force behind the world’s economy. Because of the sheer amount of data, new concerns for its use have driven innovation within the privacy and security sphere. In the coming months and years, privacy will reemerge as the latest innovation-driving force, producing long term changes from trends happening now.

Why Smart Buildings Are Vulnerable To Hackers

A smart building may contain many Building Automation Systems, which share information and control various aspects of the environment. Striking a balance between connectivity between devices and safeguarding data from leaks or hacks is a big challenge. In a network of dozens or hundreds of sensors, there are numerous opportunities for attackers to break into a system.
Specific threats include malware, which can be used to take control of a computer system that controls automated systems, spyware, phishing scams, and worms. Cybersecurity firm Kaspersky says that at least 40% of smart buildings are at risk of attack.

The Future Of 5G May Be Bright, But Is It Secure?

The standardization that 5G brings is good for interoperability, but if implemented poorly, presents a greater cyber risk to future cities. 5G will replace not just legacy cellular standards, but a multitude of other wireless and wired communication standards and therefore its scope will cover personal use, business operations, transportation and smart city infrastructure. This, together with its support for dense IoT networks – which could potentially have over 1 million devices per square kilometre – means an exponential increase in the attack surface and exposure to cyber attacks on an unprecedented scale.

CompTIA survey reveals IT cybersecurity and workforce concerns

“International Trends in Technology and Workforce,” a new report from CompTIA identifies cybersecurity readiness and the struggle to find enough workers with the right skills to meet their workforce as top concerns for 2020. More than 1,500 business and technology professionals from 14 countries shared information on their business priorities for 2020, as well as perceptions of emerging technologies, cybersecurity, workforce skills, professional development strategies and the future of work.

How a network tap enhance network security | Insight

There are a number of steps that organizations can take to ensure a more secure cloud environment. One technology currently used in network monitoring systems is tap (traffic access point). A tap is a passive component that allows non-intrusive access to data flowing across the network and enables monitoring of network links. A tap uses passive optical splitting to transmit inline traffic to an attached monitoring device without data stream interference, thus ensuring no disruption to the live network.