Have we put too much emphasis on protecting the network?
Recently, much of the cybersecurity commentary and blogs have talked about new approaches for protecting the network, especially beyond the perimeter. For the past few years, …
5G networks to incite job growth and boost GDP
5G networks could create about 4.5 million jobs in the US and add roughly $1.5 trillion to the country’s GDP, according to BCG. The analysis shows that 5G will …
Number of ICS vulnerabilities disclosed in 2020 up significantly
Throughout the second half (2H) of 2020, 71% of industrial control system (ICS) vulnerabilities disclosed were remotely exploitable through network attack vectors, according …
CISOs increasingly focus on mitigating mobile security risks
The emergence of the everywhere enterprise has shifted CISO priorities away from combating network security threats and towards mitigating mobile security risks, Ivanti …
Most network outages exceed $1 million in damages
Infoblox unveils research into the foundational infrastructure challenges faced by networking and security decision-makers in the US government. The report reveals a …
3GPP standards enrich LTE and 5G with network architecture enhancements
Despite the impact of COVID-19, momentum for enhancements to LTE and 5G standards continue with additional releases from the Third Generation Partnership Project (3GPP). 5G …
Healthcare IT teams battle with technical challenges to ensure network resilience and security
IDG surveyed IT leaders from hospitals, primary and urgent care facilities, pharmaceutical companies, and other healthcare entities. The goal was to shed light on how …
Critical factors for early 5G success
The 5G ecosystem is reaching a level of technology maturity much more rapidly than earlier generations, enabling operators to develop network deployment and go to market …
The 5G toolbox of defense
For the mobile communications industry, security has always held a prominent role. However, the onset of 5G – which introduces new network architectures, services and devices …
A closer look at fileless malware, beyond the network
Cybersecurity is an arms race, with defensive tools and training pushing threat actors to adopt even more sophisticated and evasive intrusion techniques as they attempt to …
2021 will overburden already stressed infosec teams
The year 2020 has given us a contentious U.S. election, a global economic crisis, and most notably a global pandemic. Disinformation has wreaked havoc in our ability to …
Network operator spend on multi-access edge computing to reach $8.3B by 2025
Network operator spend on multi-access edge computing (MEC) will grow from $2.7 billion in 2020, to $8.3 billion in 2025, as operators invest heavily in upgrading network …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities