vulnerabilities
Askey adopts VicOne’s xZETA automotive cyber security solution to speed up time to market for 5G C-V2X
VicOne has announced that Askey implemented VicOne xZETA vulnerability scanning and SBOM (software bill of materials) management tool in development process of its connected vehicle devices that combine onboard unit (OBU), roadside
Read moreTesting shows all 4G networks vulnerable to denial of service attacks, reports Positive Technologies
According to a report by Positive Technologies, flaws in the Diameter protocol can be used by an attacker to deprive subscribers of the high speeds and superior quality promised by
Read moreCybercriminals have seven-day advantage to weaponise vulnerabilities, according to new research from Tenable
Tenable®, Inc., the Cyber Exposure company, released a new research report that quantifies the window of opportunity cybercriminals have to weaponise vulnerabilities. The research found that cybercriminals have a median seven-day
Read moreSTAnD stands up to API-based application security vulnerabilities
The Security Tools for App Development – STAnD – is a new plug-in that helps application programming interface (API) developers make their APIs secure. It does this by providing a managed security
Read moreMost organisations worried technical skills gap will leave them exposed to security vulnerabilities, says Tripwire study
Tripwire, Inc., a global provider of security and compliance solutions for enterprises and industrial organisations, today announced the results of a survey conducted by Dimensional Research that looked at the state of
Read moreNew channel partner programme created by Tenable with MSSPs to help organisations close ‘cyber exposure gap’
Tenable Inc unveiled a new partner programme, Tenable Assure™, that positions partners to build long-term, consultative relationships with customers, helping them translate raw security data into a metrics-driven program where every
Read moreOpen source security and the Internet of Things
Today’s consumer devices are becoming defined by their embedded technologies. Wireless locks for everything from doors to bicycles can be controlled from your smartphone, eliminating the frustration of lost keys
Read moreOpen source can protect your virtualised network. Here’s how.
Virtualisation has been a hot topic in telecommunications for nearly half a decade, and security concerns have remained an ever-present feature. This is not surprising given the extent to which
Read moreIoT security: Access comes in all shapes and sizes
While there are many benefits for embracing the mainstream adoption of the Internet of Things (IoT), such as improved efficiencies, cost savings and enhancing customer experience, it can also bring
Read moreOnly 30% of subscribers aware of risks from mobile network vulnerabilities, a third never check their bill
Research commissioned by Xura, Inc., a provider of secure, digital communications services, has revealed the extent to which mobile subscribers are unaware of vulnerabilities in their mobile operator’s network that
Read more