Askey adopts VicOne’s xZETA automotive cyber security solution to speed up time to market for 5G C-V2X

VicOne has announced that Askey implemented VicOne xZETA vulnerability scanning and SBOM (software bill of materials) management tool in development process of its connected vehicle devices that combine onboard unit (OBU), roadside

Read more

Testing shows all 4G networks vulnerable to denial of service attacks, reports Positive Technologies

According to a report by Positive Technologies, flaws in the Diameter protocol can be used by an attacker to deprive subscribers of the high speeds and superior quality promised by

Read more

Cybercriminals have seven-day advantage to weaponise vulnerabilities, according to new research from Tenable

Tenable®, Inc., the Cyber Exposure company, released a new research report that quantifies the window of opportunity cybercriminals have to weaponise vulnerabilities. The research found that cybercriminals have a median seven-day

Read more

STAnD stands up to API-based application security vulnerabilities

The Security Tools for App Development – STAnD – is a new plug-in that helps application programming interface (API) developers make their APIs secure. It does this by providing a managed security

Read more

Most organisations worried technical skills gap will leave them exposed to security vulnerabilities, says Tripwire study

Tripwire, Inc., a global provider of security and compliance solutions for enterprises and industrial organisations, today announced the results of a survey conducted by Dimensional Research that looked at the state of

Read more

New channel partner programme created by Tenable with MSSPs to help organisations close ‘cyber exposure gap’

Tenable Inc unveiled a new partner programme, Tenable Assure™, that positions partners to build long-term, consultative relationships with customers, helping them translate raw security data into a metrics-driven program where every

Read more

Open source security and the Internet of Things

Today’s consumer devices are becoming defined by their embedded technologies. Wireless locks for everything from doors to bicycles can be controlled from your smartphone, eliminating the frustration of lost keys

Read more

Open source can protect your virtualised network. Here’s how.

Virtualisation has been a hot topic in telecommunications for nearly half a decade, and security concerns have remained an ever-present feature. This is not surprising given the extent to which

Read more

IoT security: Access comes in all shapes and sizes

While there are many benefits for embracing the mainstream adoption of the Internet of Things (IoT), such as improved efficiencies, cost savings and enhancing customer experience, it can also bring

Read more

Only 30% of subscribers aware of risks from mobile network vulnerabilities, a third never check their bill

Research commissioned by Xura, Inc., a provider of secure, digital communications services, has revealed the extent to which mobile subscribers are unaware of vulnerabilities in their mobile operator’s network that

Read more