BROWSING: Security
2015 Predictions: CEM, big data, security will be important in 2015
The new year is upon us and while there are a number of evolving trends driving the industry in 2015 and beyond – from big data, to cloud, 5G and security – there clearly is work to be done. January is a prime time...
Vitesse talks Ethernet in connected cars
In this Q&A session, Vitesse Semiconductor CTO Martin Nuss discusses connected cars and Ethernet’s role in ensuring their functionality and security.
RCR Wireless News: Connected car is a fairly broad term. What exactly does it mean?
Martin Nuss: While the "connected car" concept has been around for quite some...
Generation Wireless: Overcoming the trust deficit
Much has been written about the long-term impact of the “sharing economy,” with most focused on the sociological, cultural and monetary aspects by implications of an economic model that depends on more people sharing fewer resources. I for one am very impressed by how...
Cisco highlights emerging security threats
Network security is big business for Cisco, and each year the company provides updates on potential new threats and the evolution of existing security loopholes. Cisco's annual security report this year highlights three trends, and also offers insight on the changing nature of countermeasures.
Snowshoe...
2015 Predictions: Mobility in 2015 and beyond
Wi-Fi/LTE integration, security, cloud set to impact mobility in 2015
Subscribers are using 4G LTE networks and consuming wireless data 14-times more than on non-4G networks, according to a recent Cisco Systems study. Today, a multitude of applications and devices are available to consume the...
Securing the connected car
Privacy and security are on everyone’s mind when it comes to the connected car: all of the industry players, consumers and regulatory organizations.
Starting with data privacy, there is a hornet’s nest of requirements depending upon geography. In the U.S., usage-based insurance solutions are a...
2015 Predictions: Data security compliance tightens within telecom
Editor’s Note: With 2015 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year.
The Fifth Amendment of the U.S. Constitution includes a clause commonly referred to as the “double...
Mobile privacy and security: How to make your phone untraceable
"We all carry a smartphone, we carry a tablet, we carry mobile devices and they're in our hands wherever we go. I want you to stop and think about that, it has two cameras on it, it has two microphones, it has GPS, it...
IoT security concerns; now is the time to act
IoT security concerns; the stakes are high
There's no question that one of the biggest trends of 2015 will be the push to make all things connected. At CES 2015 in Las Vegas, most announcements and product reveals centered around the "Internet of Things."
"This is...
2015 Predictions: Mobile security set for change in 2015
Editor’s Note: With 2015 now upon us, RCR Wireless News has gathered predictions from leading industry analysts and executives on what they expect to see in the new year.
As 2014 came to an end, it’s clear we closed out: “The year of the epic...
Generation Wireless: The mobile identity
Editor’s Note: Looking to bring a younger perspective to the mobile space, RCR Wireless News has tapped Jeff Hawn to provide insight into what’s on the minds of the tech-savvy youth of today.
Iowa recently passed a law that allows citizens to present a digital...
EMEA: LTE hacks, fake BTS and games that steal your secrets
Claudia Bacco, Managing Director – EMEA for RCR Wireless News, has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...
Generation Wireless: LS is watching
Editor’s Note: Looking to bring a younger perspective to the mobile space, RCR Wireless News has tapped Jeff Hawn to provide insight into what’s on the minds of the tech-savvy youth of today.
George Orwell’s classic dystopia novel “1984” popularized the phrase “Big Brother is...
Reality Check: The keys to solving the mobile security conundrum
Editor’s Note: Welcome to our weekly Reality Check column where C-level executives and advisory firms from across the mobile industry share unique insights and experiences.
Every day, it seems there is another high-profile security breach in the news. These stories have only served to highlight...
EMEA: Automotive Ethernet – safe or sorry?
Claudia Bacco, Managing Director – EMEA for RCR Wireless News, has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...
EMEA: Nokia Security Center live in Berlin
Claudia Bacco, Managing Director – EMEA for RCR Wireless News – has spent her entire career in telecom, IT and security. Having experience as an operator, software and hardware vendor and as a well-known industry analyst, she has many opinions on the market. She’ll be...
IEEE GlobeCom: Cloud security through virtualization
AUSTIN, Texas – Speaking at this week's IEEE GlobeCom expo in Austin, AT&T Chief Security Officer Edward Amoroso proposed that enterprise cloud security could potentially be based on the same network architecture used by an infamous piece of malware.
Amoroso gave a keynote speech envisioning...
EMEA: Deutsche Telekom partners with U.S.-based FireEye to fight cyber attacks
In the ongoing battle against cyber attacks and espionage, Deutsche Telekom's business customer unit, T-Systems, is joining with the Silicon Valley firm FireEye to offer security-as-a-service to European organizations.
According to a FireEye study, many European firms are not able to quickly respond to breaches ― the median response...
EMEA: Slush 2014 recap
Slush 2014 took place this week in Helsinki, Finland. Started in 2008 with only around 150 attendees, this year’s attendee count clocked in at just over 14,000 showing amazing growth. The atmosphere was a mix of nightclub and conference, with participants from a range...
Reader Forum: Will Apple’s encryption move trigger stronger surveillance laws?
Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we maintain some editorial control...
Report: Mobile, security, big data to drive 2015 hiring trends
The annual look at technology hiring trends by research firm Robert Half Technology concludes that mobile, big data and network security are driving businesses trends now, and will shape 2015 hiring trends in the tech fields.
"The supply of highly skilled technology professionals is expected...
What is a micro-VPN?
Today's mobile workers are often more than willing to use personal devices to get work done, and that can mean significant savings for their employers. Not only can IT spending on devices go down, but productivity can go up.
The downside, of course, can be...
EMEA: Europe’s ‘real digital commissioner’ takes aim at US data deal
Andrus Ansip, the candidate to lead the European Union's Digital Internal Market, is willing to suspend the safe harbor agreement with the U.S. if Europe's security concerns are not addressed.
The safe harbor agreement regulates the transfer of Europeans' personal data to the U.S. It affects thousands of technology...
EMEA: Russia’s attempt to close off Internet, part of a trend?
Vladimir Putin wants to take Russia off the global Internet in case of an emergency, like war or anti-government protests, according to recent reports — reports which, of course, the Kremlin denies.
It's easy to dismiss this move as the madness of Vlad (as German Chancellor Angela...