![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092957/dx-400x200.png)
Cybersecurity is a top priority for digital transformation
Cybersecurity is the number one technology priority for planned digital transformation projects as businesses adapt to a surge in remote working as a result of COVID-19. …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094125/5G-400x200.jpg)
114 5G commercial networks now live worldwide
Mobile network operators continued to bring 5G networks online despite the pandemic and economic downturn, even as new 5G subscriber growth tempered in some areas, according …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/11105012/risk-low-high-400x200.jpg)
Large vendor ecosystems and low visibility increase third-party cyber risk
80% of organizations experienced a cybersecurity breach that originated from vulnerabilities in their vendor ecosystem in the past 12 months, and the average organization had …
![Network](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102932/network-bot-400x200.jpg)
Expansion opportunities in the next-generation wireless BSS market
Business support systems (BSS) are necessary to provide the fast-changing requirements in 5G and enhance customer experiences, a Frost & Sullivan research reveals. They …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100228/ddos-400x200.jpg)
Bit-and-piece DDoS attacks increased 570% in Q2 2020
Attackers shifted tactics in Q2 2020, with a 570% increase in bit-and-piece DDoS attacks compared to the same period last year, according to Nexusguard. Perpetrators used …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
A look at the top threats inside malicious emails
Web-phishing targeting various online services almost doubled during the COVID-19 pandemic: it accounted for 46 percent of the total number of fake web pages, Group-IB …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094905/5g-400x200.jpg)
Ongoing and initial costs top list of barriers to 5G implementation
5G is set to deliver higher data transfer rates for mission-critical communications and will allow massive broadband capacities, enabling high-speed communication across …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094125/5G-400x200.jpg)
Five critical success factors for the 5G economy
Policymakers should focus on five critical success factors in order to ensure the US continues to build its emerging 5G economy, according to a report from Boston Consulting …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/06094247/5g-earth-400x200.jpg)
Emerging countries will adopt 5G faster than expected
Emerging markets have always been behind developed countries in adopting the latest generation mobile networks, with a few exceptions. While it would be safe to assume that …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09095042/user-400x200.jpg)
Researchers develop secure multi-user quantum communication network
The world is one step closer to having a totally secure internet and an answer to the growing threat of cyber-attacks, thanks to a team of international scientists who have …
![Internet](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102433/internet-400x200.jpg)
Global WAN optimization market to reach $4.88 billion by 2027
The global wide area network optimization market size is estimated to reach $4.88 billion by 2027, registering a CAGR of 9.5% from 2020 to 2027, according to Grand View …
![5G](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094905/5g-400x200.jpg)
Recommendations to enhance subscriber privacy in 5G
There are clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications, according to the Trusted Connectivity Alliance. …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)