Ericsson, Nokia putting plans in place to break up supply chain: Report
Ericsson and Nokia are both putting together contingency plans to move elements of their supply chains out of China if necessary due to national security
Ericsson and Nokia are both putting together contingency plans to move elements of their supply chains out of China if necessary due to national security
U.S. officials and a number of governments around the world have been urging restriction on, or outright bans of, the use of network equipment from
The size of distributed denial of service attacks is “growing at an alarming pace all around the world,” according to NetScout Systems’ 14th annual report on
Poland has arrested two telecom employees on suspicion of spying for the Chinese state: a Chinese employee of infrastructure vendor Huawei and an employee of
WASHINGTON, D.C.–Amid high anticipation for 5G capabilities and applications, the question of who is — or ought to be — responsible for ensuring security and
New report finds that 92% of organizations plan to increase cyber security spending Nearly 80% of enterprise cyber security professionals think that network security is more
If it seems like you’re hearing more about ransomware attacks, it’s not just that more high-profile attacks — like the recent takeover of some city
Hybrid cloud complexity creating security challenges Container security company Capsule8 recently released a survey conducted by Enterprise Strategy Group (ESG) in November 2017 exploring trends in
Security concerns are regularly cited as the number one IoT deployment concern or barrier to adoption. “Security” covers a wide swath of considerations, both in terms
As athletes battle it out on the rinks and slopes of the Pyeongchang Olympics, a quieter fight is underway on Olympic networks. The “Olympic Destroyer”
As athletes battle it out on the rinks and slopes of the Pyeongchang Olympics, a quieter fight is underway on Olympic networks. The “Olympic Destroyer”
Securing open distributed architectures Service providers have gravitated toward open distributed architectures over the past few years with the rise of network functions virtualization (NFV), software-defined
As large-scale, automated “botnet” attacks become a matter of increasing concern for the internet of things, the U.S. Department of Commerce and the Department of