DEFENDING OUR DATA: HUAWEI, 5G AND THE FIVE EYES

May 1, 2019

The greater part of my thirty-eight-year career in the British Intelligence and Security Community was defined by meeting the threat to the UK’s national security from Communist states. The fact that the British Government now appears to have decided to place the development of some its most sensitive critical infrastructure in the hands of a company from the People’s Republic of China (PRC) is deeply worrying. The PRC uses its sophisticated technical capabilities not only to control its own population (to an extreme and growing degree) but it also conducts remotely aggressive intelligence gathering operations on a global scale.

Spotlight

Security Pursuit, LLC

Security Pursuit provides computer security services to help organizations protect their business-critical information systems. Services include network security, website security, penetration testing, vulnerability assessments, wireless network security, data breach incident response, social engineering prevention and other information security advisory functions.

OTHER WHITEPAPERS
news image

Top Ten Considerations for Your Nextgeneration SD-WAN

whitePaper | September 7, 2022

The need for organizations to change to meet evolving business environments is not a new concept. However, what is new in our current moment is the pace of change. Organizations across all industries now have to adapt to a rapidly evolving IT and application environment. These changes have been accelerated by a global pandemic that is forcing employees to work remotely and by the adoption of modern applications that are distributed across corporate data centers, multiple public clouds, and increasingly, edge locations. Unfortunately, both of these efforts create more IT complexity.

Read More
news image

Service Provider Outlook

whitePaper | July 20, 2021

In 2Q21, Heavy Reading surveyed 86 communications service providers (CSPs) across global regions on their plans for customer premises equipment overall and universal CPE (uCPE) specifically. This report presents the highlights of that survey. Omdia’s uCPE Tracker – 1H21 Annual Forecast report projects that the worldwide uCPE hardware market will grow from $52.5m in 2020 to $2.3bn in 2025—an impressive CAGR of 113% over five years. With this in mind, Heavy Reading expected to see good support for uCPE from survey respondents, and we were not disappointed. We targeted the survey at CSPs planning to implement uCPE within, at most, 24 months. Nevertheless, the respondent pool showed a more lively than anticipated adoption of uCPE. 59% of US, 61% of Asia Pacific (APAC), and 39% of Europe, the Middle East, and Africa (EMEA) respondents have already deployed uCPE.

Read More
news image

5G-Advanced Technology Evolution from a Network Perspective 2.0(2022)

whitePaper | July 12, 2022

The commercialization of 5G networks is accelerating globally. From the perspective of industry development drivers, 5G communications are considered the key to personal consumption experience upgrades and digital industrial transformation. Major economies around the world require 5G to be an essential part of long-term industrial development.

Read More
news image

5G TERMS AND ACRONYMS

whitePaper | November 15, 2019

The promise of 5G is faster and more reliable communications. 5G opens doors to exciting new connections to Internet of Things (IoT) networks, autonomous driving, broadband wireless, and interruption-free video viewing. Whatever you develop 5G technology for, it will be imperative to understand design and test concepts and solutions across multiple dimensions. There are a lot of 5G terms and more on the way. We’ve got you covered – here’s a list of what’s out there today. Second-generation digital cellular networks used by mobile phones, designed as a replacement for analog first-generation radio (1G). Designed primarily for voice using digital standards.

Read More
news image

5G Security

whitePaper | December 7, 2021

Why is 5G secure? How do experts from industry and standards organizations ensure that 5G security risks can be effectively managed in terms of security protocols and standards as well as security assurance mechanisms? Why are Huawei 5G products secure? What technical and management measures has Huawei adopted to ensure cyber security of Huawei equipment? How to ensure 5G cyber security, including Huawei's support for cyber resilience and recommendations on how to deploy and operate 5G networks in a secure manner. How to ensure 5G operations comply with national security regulations, including suggestions for regulators in developing laws and regulations and implementing regulatory policies.

Read More
news image

IT at Intel: Scaling Intel’s Data Centers with Software-Defined Networking and Automation

whitePaper | July 20, 2022

As Intel’s business grows, demand for data center network capacity has increased by more than 25% annually. Additionally, business pressures require new capacity to be brought into production within 24 hours. As far back as 2014, we recognized the potential of software-defined networking (SDN) to help meet these challenges.

Read More

Spotlight

Security Pursuit, LLC

Security Pursuit provides computer security services to help organizations protect their business-critical information systems. Services include network security, website security, penetration testing, vulnerability assessments, wireless network security, data breach incident response, social engineering prevention and other information security advisory functions.

Events