British Parliament Wakes Up To Huawei

The Westminster Parliament's Science and Technology Committee has urged the Government to plan for other emerging technologies to avoid the row over 5G and Huawei equipment and they have released a report highlighting the UK's dependence on just two 5G vendors, which it claims, poses a risk to national security. 

The proposals are in response to the deployment of 5G in the UK, which saw Chinese firm Huawei ultimately excluded from the process on security grounds, leaving the country reliant on only two equipment vendors while causing a likely delay to the full installation of 5G networks.

While the government did eventually act on expert security advice and banned Huawei’s 5G the legislation took so long that it left the UK with just Ericsson and Nokia as 5G partners. The 5G strategy has come too late and will take years to achieve any success, according to MP Greg Clark, who is the committee's chair.  "A lack of strategic foresight in 5G has seen the UK become dependent on only two vendors for a crucial technology...We must learn from this experience to avoid making our economy and security vulnerable from a lack of acceptable alternatives in emerging technologies."Clark said. 

Advances in Artificial Intelligence (AI) and Quantum Computing are examples of emerging technologies that, like 5G, can be potential threats to personal and national security.

Greg Clark called for a clear, proactive strategy to avoid a similar situation to the Huawei saga, criticising the UK government's 5G diversification strategy. "The government needs to take an activist approach to encourage research and development, and must now co-operate internationally to build common regulatory approaches with like-minded nations." he said.

The Parliamentary Committee's main concern is that these technologies develop at a faster rate than anything seen before, that time was  being lost and that the government needs to lay out a  formal strategy to avoid a future  dependence on a small number of  technology vendors, let alone one. 

A Department for Digital, Culture, Media and Sport spokeswoman said: “The security and resilience of 5G and other emerging technologies is a top priority and our £250 million strategy to tackle this global issue head-on is the first of its kind in the world
.. We are working at pace with international and industry partners on solutions and establishing a National Telecommunications Lab to open up new economic opportunities in mobile technology.”

UK Parliament:     ITPro:        Belfast Telegraph:      BBC:       News&Star:     Image: Unsplash

You Might Also Read:

5G Will Disrupt Cyber Security:

Google Blocks Huawei From Android:

« Get Your Cyber Security Plan In Place Now
3D Secure Authentication: What Is it, And Why Do I Need It? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.