YOU ARE AT:TagsSecurity

BROWSING: Security

Reader Forum: 4 ways to reduce business risk, deflect cybersecurity threats with wireless backhaul

What do Spotify, the European Central Bank and Apple have in common? All were the targets of major cybersecurity attacks in 2014, which rose a whopping 48% from 2013 to 2014. Unsurprisingly, people are rattled. According to a survey by PricewaterhouseCoopers, 24% of consumers...

Is network security going military-grade?

As high-profile network security breaches continue to make the news, with the most recent breach of the federal Office of Personnel Management, network security firms with defense pedigrees are looking to target the service provider markets – including mobile network operators – both for their...

Reality Check: When it comes to mobile wallets, how will you prevent fraud?

An infographic published by Dynatrace reveals just how pervasive mobile usage has become. For instance, mobile app downloads are expected to rise to 200 billion by 2017 – a 185% jump from 2013. A statistic of particular interest for merchants is that mobile users...

Reality Check: Grappling with growing ‘insecurity of things’

I have never seen a situation quite like it in my 22 years in the high-tech industry. I am referring to the sudden and more intense focus by executives on data security, digital trust and intrusion protection. During my meetings with clients in the past...

Allot: Cloud use driving need for application visibility

Mobility and the cloud are the top two trends affecting enterprise networks, and application visibility is becoming increasingly important to network security as businesses put more of their functions into cloud-based apps, according to Yaniv Sulkes, AVP of marketing for Allot. He said that while content...

Verizon flaw left millions open to cyberattack

Carrier fixed problem after being tipped off by BuzzFeed In response to input from a news outlet, Verizon this week fixed a security gap that left some 9 million home Internet customers open to a relatively simple, but devastating, cyberattack. BuzzFeed News broke the story on...

Hackers plan to remotely hijack connected car

DARPA researchers plan to demo vulnerability of connected car at conferences WASHINGTON – Cybersecurity researchers Charlie Miller and Chris Valasek, funded by the federal government, announced they will publicly hack a connected car or truck. The duo received a 2013 grant from the Defense Advance Projects...

Mobile tracking charge ends in FTC settlement

The Federal Trade Commission reached a non-monetary settlement with Nomi Technologies based on a complaint that the firm helped retailers track millions of customers via their mobile phones. “Nomi will be prohibited from misrepresenting consumers’ options for controlling whether information is collected, used, disclosed or...

Defense consultant thinks IoT will shape cybersecurity

More connected devices equates to more cybersecurity exposure, more risk WASHINGTON – Booz Allen Hamilton, one of the nation's largest management consulting firms that is well known for its broad range of experience on cybersecurity, has predicted that a new and more comprehensive approach will...

Ericsson and Intel Security team up on security solutions

A secure solution from Ericsson and Intel Security The explosion of connectivity over the last few years has brought value to all sorts of new frontiers in business and society. But with all that growth comes increased difficulty to keep information on the networks safe...

EMEA: The connected car battle for the dashboard

Booz Allen Hamilton recently published its views on the increasing battle for the dashboard in the connected car. I had the opportunity to learn more about the company and its work in this space. As more and more industry players traditionally known for expertise in IT and...

IBM to release 20 years worth of cyberthreat data

In an apparent attempt to help fight cyber attacks, IBM has announced it will make its 700 TB database filled with raw cyberthreat data available to private and public companies. The company has said it will release the data through its new X-Force Exchange platform,...

Planes could be vulnerable to cyber attack via Wi-Fi

In-flight Wi-Fi could potentially open up avionics controls to hackers The U.S. Government Accountability Office on April 14 released a report detailing the potential for in-flight Wi-Fi networks to be compromised by cyber attacks. In the 56-page report, the GAO found that connectivity associated with modern...

EMEA: KPN pushes Blackphones for security, encryption

KPN's CIO Jaya Baloo wants everyone to “live long, laugh a lot and encrypt everything.” Speaking at the International NCSC One Conference in The Hague, Baloo said encryption was essential for protecting the freedom of expression. Baloo also praised the Blackphone, a secure smartphone designed by Silent Circle that...

Verizon DBIR: Mobile is not a significant data breach threat

Verizon's latest look at data breaches and network security concludes that mobile continues to be relatively secure – not a preferred path for real-world data breaches – in spite of the presence of malware. This year's Data Breach Investigation Report tallied nearly 80,000 security incidents, with more...

Worst of the Week: FCC fines – what’s the price of shame?

Hello! And welcome to our Friday column, Worst of the Week. There’s a lot of nutty stuff that goes on in this industry, so this column is a chance for us at RCRWireless.com to rant and rave about whatever rubs us the wrong way....

Takeovers bear fruit for Cisco in mobile security

A string of takeovers has given Cisco new security capabilities, and this week the company revealed how it's putting the pieces together. The IT giant has added new analytics capabilities to its malware protection portfolio, bringing together firewall technology acquired from Sourcefire in 2013...

Reader Forum: How to ensure your business phone systems are secure

Hackers have been featured on the news recently as credit cards and passwords have been obtained in breaches, leaving millions to worry about whether their bank accounts or e-mail addresses are secure. However, there is another area that unethical hackers are targeting that isn’t...

Analyst Angle: Security in the age of BYOx

In the face of unstoppable corporate and consumer adoption of mobile devices, security and privacy implications of cloud and mobile are a deepening concern for many security professionals. Most organizations are just beginning to adopt and integrate "bring-your-own-device" policies, putting them several steps behind...

HP set to acquire encryption firm Voltage Security

HP to buy Voltage Security Hewlett-Packard announced plans to buy data-encryption company Voltage Security in what appears to be a push toward cloud-based security products. Financial terms of the deal were not disclosed. HP said it fold Cupertino, Calif.-based Voltage into its security division, Atalla. Stanford University...

EMEA: Nokia Networks powers 5G IoT

The "Internet of Things," 5G and security are all hot topics. Nokia Networks has pulled them all together in announcing its vision for secure IoT connectivity via 5G that will be demonstrated at the upcoming Mobile World Congress event. There are many statistics in the public...

Connected car universe 2015 predictions

Defining the industry connected car landscape was challenging. It started with the very first question for the interview participants: What category would you describe yourself as within the connected car landscape? Thinking this would be an easy question, many respondents considered it to be a difficult one...

2015 Predictions: cloud economics and security

Cloud economics Capital expenses vs. operating expenses has been debated rigorously for some time now, and many cite capex reduction as the reason for moving to the cloud. However, whether on the capex side or the opex side of the debate, organizations are still missing...

EMEA CEOs: F-Secure on 2015 security challenges

The data-threat landscape continues to gain sophistication. With every solution launched to protect our data, there seems to be a new tactic in play to undermine that protection. F-Secure is working hard to stay ahead of the criminals, hackers and espionage activities as they become...