Magazine Button

Telecom

Huawei global expert speaks out on cybersecurity needs in KSA

Huawei joined top government, business and academic leaders in Saudi Arabia at the Global Cybersecurity Forum held in Riyadh. The company is advocating for uniform standards that support cybersecurity risk mitigation, Andy Purdy, Huawei’s Chief Security Officer in the US, was in KSA to stress the importance of a co-operative approach to cybersecurity risk mitigation […]


Telkom invests in cybersecurity awareness

Redefining a culture of security awareness to ensure corporate and personal security for employees. Telkom South Africa (SA), a leading telecommunications service provider in South Africa, invested in ongoing employee training and development to ensure cybersecurity awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at risk of fraud, theft and […]


Mobile service providers preparing to fortify security in anticipation of 5G deployments

According to a global survey fielded by the Business Performance Innovation (BPI) Network, in partnership with A10 Networks, mobile service providers anticipate significant new revenue opportunities from the forthcoming deployment of high-speed 5G networks and a host of new IoT-driven use cases, but they also believe much-improved security will be essential to realising that potential. […]


4G to 5G migration – The changing role of security

Fortinet’s security solutions for 4G and 5G provide a common set of security tools and solutions enabling a safe transition from 4G to 5G and the secure delivery of 5G’s unique use cases such as MEC and Network Slicing.


5G architecture and technologies and their impact on security

The emerging 5G Core represents a significant shift in technology and architecture. The foundation is a cloud-native architecture built on the same technologies used extensively in cloud services. This provides huge scope for a flexible, service driven, agile and dynamic network which will allow operators to capitalise on significant new revenue opportunities for rich and […]


5G: Running before you can walk

The hype of new technologies in the market means business leaders can often become distracted by mundane requirements such as ensuring reliable security is in place. Dmitry Kurbatov, CTO at Positive Technologies, tells us why one out of every three attacks on 5G infrastructure succeed and he discusses the absolute necessity of having an effective […]


F-Secure joins ETIS to help Europe’s telecom providers secure smart homes

Cybersecurity provider, F-Secure, has joined ETIS, an organisation that facilitates cooperation between companies working in the European telecommunications sector. As an associate member of ETIS, F-Secure hopes to contribute its cybersecurity expertise to help stakeholders collectively address security challenges facing the telecommunications industry and its customers. F-Secure has over 20 years of experience in partnering […]


Zain Jordan partners with Infoblox to provide secure Internet experience

Zain, a leading telecom company in Jordan, has implemented the market leading Infoblox ActiveTrust solution to enable secure Internet browsing for its subscribers. Now both, home and business users of Zain’s Internet services are assured protection against malware and the risk of data exfiltration without having to pay any additional security subscription fees. Since its […]


Ovum and Juniper cybersecurity webinar

A Cybersecurity webinar by Ovum and Juniper Networks. Speakers Andrew Milroy, Head of Advisory Services APAC, Ovum, and Harry Toolseram, Consulting Engineer, Juniper Networks, talk about how organisations are prioritising their Digital Transformation agenda.


Positive Technologies experts: 5G launches with security flaws

Positive Technologies has released its report, 5G Network Security: Vulnerabilities Old and New, which outlines some of the greatest risks facing 5G as networks as they begin to launch around the world. 5G promises superfast connection speeds, ultra-low latency and greater capacity which represent huge opportunities for operators to transform their businesses, allowing them to […]


Browse our latest issue

Intelligent CISO

View Magazine Archive