YOU ARE AT:TagsSecurity

BROWSING: Security

2015 Predictions: CEM, big data, security will be important in 2015

The new year is upon us and while there are a number of evolving trends driving the industry in 2015 and beyond – from big data, to cloud, 5G and security – there clearly is work to be done. January is a prime time...

Vitesse talks Ethernet in connected cars

In this Q&A session, Vitesse Semiconductor CTO Martin Nuss discusses connected cars and Ethernet’s role in ensuring their functionality and security. RCR Wireless News: Connected car is a fairly broad term. What exactly does it mean? Martin Nuss: While the "connected car" concept has been around for quite some...

Generation Wireless: Overcoming the trust deficit

Much has been written about the long-term impact of the “sharing economy,” with most focused on the sociological, cultural and monetary aspects by implications of an economic model that depends on more people sharing fewer resources. I for one am very impressed by how...

Cisco highlights emerging security threats

Network security is big business for Cisco, and each year the company provides updates on potential new threats and the evolution of existing security loopholes. Cisco's annual security report this year highlights three trends, and also offers insight on the changing nature of countermeasures. Snowshoe...

2015 Predictions: Mobility in 2015 and beyond

Wi-Fi/LTE integration, security, cloud set to impact mobility in 2015 Subscribers are using 4G LTE networks and consuming wireless data 14-times more than on non-4G networks, according to a recent Cisco Systems study. Today, a multitude of applications and devices are available to consume the...

Securing the connected car

Privacy and security are on everyone’s mind when it comes to the connected car: all of the industry players, consumers and regulatory organizations. Starting with data privacy, there is a hornet’s nest of requirements depending upon geography. In the U.S., usage-based insurance solutions are a...

2015 Predictions: Data security compliance tightens within telecom

Editor’s Note: With 2015 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. The Fifth Amendment of the U.S. Constitution includes a clause commonly referred to as the “double...

Mobile privacy and security: How to make your phone untraceable

"We all carry a smartphone, we carry a tablet, we carry mobile devices and they're in our hands wherever we go. I want you to stop and think about that, it has two cameras on it, it has two microphones, it has GPS, it...

IoT security concerns; now is the time to act

IoT security concerns; the stakes are high There's no question that one of the biggest trends of 2015 will be the push to make all things connected. At CES 2015 in Las Vegas, most announcements and product reveals centered around the "Internet of Things." "This is...

2015 Predictions: Mobile security set for change in 2015

Editor’s Note: With 2015 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year. As 2014 came to an end, it’s clear we closed out: “The year of the epic...

Generation Wireless: The mobile identity

Editor’s Note: Looking to bring a younger perspective to the mobile space, RCR Wireless News has tapped Jeff Hawn to provide insight into what’s on the minds of the tech-savvy youth of today. Iowa recently passed a law that allows citizens to present a digital...

EMEA: LTE hacks, fake BTS and games that steal your secrets

Claudia Bacco, Managing Director – EMEA for RCR Wireless News, has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...

Generation Wireless: LS is watching

Editor’s Note: Looking to bring a younger perspective to the mobile space, RCR Wireless News has tapped Jeff Hawn to provide insight into what’s on the minds of the tech-savvy youth of today. George Orwell’s classic dystopia novel “1984” popularized the phrase “Big Brother is...

Reality Check: The keys to solving the mobile security conundrum

Editor’s Note: Welcome to our weekly Reality Check column where C-level executives and advisory firms from across the mobile industry share unique insights and experiences. Every day, it seems there is another high-profile security breach in the news. These stories have only served to highlight...

EMEA: Automotive Ethernet – safe or sorry?

Claudia Bacco, Managing Director – EMEA for RCR Wireless News, has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...

EMEA: Nokia Security Center live in Berlin

Claudia Bacco, Managing Director – EMEA for RCR Wireless News – has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...

IEEE GlobeCom: Cloud security through virtualization

AUSTIN, Texas – Speaking at this week's IEEE GlobeCom expo in Austin, AT&T Chief Security Officer Edward Amoroso proposed that enterprise cloud security could potentially be based on the same network architecture used by an infamous piece of malware. Amoroso gave a keynote speech envisioning...

EMEA: Deutsche Telekom partners with U.S.-based FireEye to fight cyber attacks

In the ongoing battle against cyber attacks and espionage, Deutsche Telekom's business customer unit, T-Systems, is joining with the Silicon Valley firm FireEye to offer security-as-a-service to European organizations. According to a FireEye study, many European firms are not able to quickly respond to breaches ― the median response...

EMEA: Slush 2014 recap

Slush 2014 took place this week in Helsinki, Finland. Started in 2008 with only around 150 attendees, this year’s attendee count clocked in at just over 14,000 showing amazing growth. The atmosphere was a mix of nightclub and conference, with participants from a range...

Reader Forum: Will Apple’s encryption move trigger stronger surveillance laws?

Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we maintain some editorial control...

Report: Mobile, security, big data to drive 2015 hiring trends

The annual look at technology hiring trends by research firm Robert Half Technology concludes that mobile, big data and network security are driving businesses trends now, and will shape 2015 hiring trends in the tech fields. "The supply of highly skilled technology professionals is expected...

What is a micro-VPN?

Today's mobile workers are often more than willing to use personal devices to get work done, and that can mean significant savings for their employers. Not only can IT spending on devices go down, but productivity can go up. The downside, of course, can be...

EMEA: Europe’s ‘real digital commissioner’ takes aim at US data deal

Andrus Ansip, the candidate to lead the European Union's Digital Internal Market, is willing to suspend the safe harbor agreement with the U.S. if Europe's security concerns are not addressed. The safe harbor agreement regulates the transfer of Europeans' personal data to the U.S. It affects thousands of technology...

EMEA: Russia’s attempt to close off Internet, part of a trend?

Vladimir Putin wants to take Russia off the global Internet in case of an emergency, like war or anti-government protests, according to recent reports — reports which, of course, the Kremlin denies. It's easy to dismiss this move as the madness of Vlad (as German Chancellor Angela...