Betacom, along with its partners Axis Communications and Evolon Technology, has introduced an AI-powered perimeter surveillance solution called Betacom PSS. It offers round-the-clock physical threat detection for airports, warehouses, and manufacturing facilities, delivering results in a shorter time and at a reduced cost compared to traditional wired and public wireless solutions. Betacom PSS relies on Axis cameras equipped with Evolon’s AI-based image detection technology, all operating on Betacom’s managed private 4G/5G network.
Singtel announced that it is one of the world’s first to have 5G Security-as-a-Slice (SecaaS) as a capability, which proactively identifies and blocks cyber threats at the network level, thus preventing them from reaching the network’s users. According to a survey by Singtel among its customers in December 2022, nine out of 10 users expressed concern about security but only three had installed cybersecurity applications to protect their digital assets.
Realtime services and applications place new demands on overall network performance and reliability. As a result, mobile operators are under pressure to improve their networks to ensure a high-quality user experience supported by high service availability.
This Press Release highlights SecurityGen’s ambitious growth plans for the SEA region driven by SEA’s comprehensive and ambitious 5G rollout. Given the growth potential in the region, we are supplementing our commitment to this area with the relocation of our experts and developing local talent towards creating a dedicated research team within the geography. This move will reinforce our deep expertise in the telecom domain and our innovative solutions and services designed to help ensure secure 5G transitions for SEA-based MNOs. With our stack of carrier-grade telecom security solutions and deep expertise, we are excited to grow and deepen our engagements with leading MNOs in this region.
Adva Network Security today announced that its flagship 10Gbit/s edge solution with ConnectGuard(TM) Ethernet encryption has been approved for the transmission of classified data by the German Federal Office for Information Security (BSI).
While private mobile networks create new security considerations for enterprise security leaders, proactive measures can be taken to mitigate these risks and stay a step ahead. In this article, we provide the following areas to focus on in 2023 as private mobile network security earns a spot on the CISO priority list.
Indian mobile phone operators are expected to at least double their investments in network security, with the 5G rollout expected to spark a surge in network vulnerabilities, which assume critical importance, especially for enterprises
SecurityGen, the global security provider of telecom security solutions and services, unveils its new cutting-edge 5G Cyber Security Lab. This will empower mobile network operators to become knowledgeable about their 5G networks in order to protect them from digital threats. The lab serves as a beneficial tool for MNO teams who want to stay ahead with effective cyber defense strategies.
The 5G security integration with OneLayer prioritizes robust security and continuous operations for Druid Software’s clients, including system integrators and their private cellular networks.
Cybersecurity and telecom providers from around the world can now test their technologies and use cases in OneLayer’s digital twin private network environment
MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
At a time when manufacturing facilities are increasingly implementing LTE and 5G networks, OneLayer addresses the need for enterprise-grade security ensuring organizations achieve the return on investment expected from their private networks
OneLayer teams up with Nokia and Cellcom to secure hundreds of doctors’ carts, patient beds, and medical devices connected via cellular networks.
The automotive industry is undergoing a revolutionary change towards software-defined vehicles, 5G connectivity, and autonomy. To cope with this change, the vehicle ecosystem has had to rapidly evolve, leading to the emergence of new potential attack surfaces and target methods. This article focuses on the landscape of vehicle attacks, challenges faced by the Auto OEMs, and the revolutionary approach taken by HARMAN where they build a safety net for customers through anomaly detection and attack prevention.
To compete safely at the speed of the cloud, telecom operators should evaluate industry best practices, collaboration, and innovation, setting the best security and privacy strategies based on individual regulatory and market contexts.
In today’s world, the network’s security is of prime importance. It’s on the top of the mind of everyone, be it the CEO, CSIO, the CTO, or the CMO. Moreover, it’s an important topic in all boardroom conversations as glitches in security will impact the brand.”
Public cellular networks have been around for years, and many security tools keep them running. Likewise, enterprise IoT networks are not new, and a wide variety of great security solutions have been developed to protect these networks. So why is a different security solution necessary for private cellular networks?
Who are the global security startups that are innovating to solve the security challenges, including protecting public and private networks?
Can mobile operators use 5G to enhance security and monetize their networks at the same time? The answer is an emphatic Yes! 5G has functions such as NEF (Network Exposure Function) that expose the vast capabilities of Mobile Networks using standardized APIs. It allows mobile operators and private network operators to provide new services and monetize their networks.
The UK Government’s Department for Digital, Culture, Media and Sport (DCMS) is leading delivery of the Digital Connectivity Infrastructure Accelerator (DCIA) programme. This programme specifically addresses the challenges associated with the use of publicly owned infrastructure assets to support the roll out of advanced wireless connectivity.
The security paradigm has made significant evolution over the last couple of decades. When it comes to securing today’s ‘no-boundaries’ business applications, no assumptions, and zero trust.
Cyberattacks increasingly frequent, costly. The threats are staggering. On average, it takes more than 250 days to find and mitigate a network breach. Cyberattacks are up 92%, and the average data breach now costs $3.86 million,
As the manufacturing sector modernizes, facilities are increasingly reliant on IoT and connected devices. But, what are the security risks and challenges of private cellular networks for Industry 4.0? What are the differences from a security perspective between enterprise IP and private cellular networks? So, what should we do for a better tomorrow? What is the solution?
Security Updates from External Media