WELCOME TO The networking REPORT
4 ways 5G will change your enterprise threat model
| March 3, 2020
SecuredTouch is a pioneer in behavioral biometrics for mobile, delivering continuous authentication technologies to strengthen security and reduce fraud while improving customers digital experience.
Article | July 28, 2021
Publicly available announcements on all telecom contracts started to see a slowdown in 2nd quarter of 2019 and dipped in the 2nd quarter of 2020. We believe there might be several factors that could lead to the slowdown in 2019. In transport networking, operators are assessing new deployment models that include virtualization and disaggregated platform and in wireless segment, 4G rollout has reached maturity and started to see decline while 5G rollouts have just started and at an early phase of evaluation. And obviously at the end of 2019, we are seeing a more distinct slowdown likely from the impact of COVID-19 on global business deals. CSP has been more cautious with spending due to the challenges and uncertainties from the pandemic. However, dynamics related to COVID-19 have on the other hand accelerated bandwidth consumptions and subsequently driven investments across all segments of the network as we start to see recovery in the number of contracts announcement in the recent few quarters.
Article | March 3, 2020
With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider the security implications of deploying the technology. Over the next few years, 5G networks are expected to play a central role in enabling new digital transformation initiatives and in supporting new business use cases that are beyond the reach of current 4G-network technology. Driving much of that change will be 5G’s speeds of up to 1Gbps, its 1-millisecond latencies, and its support for up to about 100 times more connected devices per unit area compared to 4G.
Article | February 19, 2020
The 5G era is about to arrive, to enable a host of new business applications. The next-generation cellular technology is designed , but 5G security is also much more complicated to manage. 5G poses an elevated security threat partly because there are more vectors through which adversaries can attack. The technology is set to enable a huge number of connected devices, collectively known as the ).
Article | April 16, 2020
At about 9.30pm on Easter Monday, in the small Dutch town of Almere near Amsterdam, the fire brigade was called to put out a blaze at a large telecoms mast—the second fire of its kind that night in the area. Though neither of the Almere towers were equipped with any of the latest 5G telecoms equipment—in fact one was designed only for use by the emergency services—authorities soon concluded that the fires were perpetrated by vandals acting in the name of an unusual theory: that 5G networks have contributed to the coronavirus pandemic.
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE