British Parliament Wakes Up To Huawei

The Westminster Parliament's Science and Technology Committee has urged the Government to plan for other emerging technologies to avoid the row over 5G and Huawei equipment and they have released a report highlighting the UK's dependence on just two 5G vendors, which it claims, poses a risk to national security. 

The proposals are in response to the deployment of 5G in the UK, which saw Chinese firm Huawei ultimately excluded from the process on security grounds, leaving the country reliant on only two equipment vendors while causing a likely delay to the full installation of 5G networks.

While the government did eventually act on expert security advice and banned Huawei’s 5G the legislation took so long that it left the UK with just Ericsson and Nokia as 5G partners. The 5G strategy has come too late and will take years to achieve any success, according to MP Greg Clark, who is the committee's chair.  "A lack of strategic foresight in 5G has seen the UK become dependent on only two vendors for a crucial technology...We must learn from this experience to avoid making our economy and security vulnerable from a lack of acceptable alternatives in emerging technologies."Clark said. 

Advances in Artificial Intelligence (AI) and Quantum Computing are examples of emerging technologies that, like 5G, can be potential threats to personal and national security.

Greg Clark called for a clear, proactive strategy to avoid a similar situation to the Huawei saga, criticising the UK government's 5G diversification strategy. "The government needs to take an activist approach to encourage research and development, and must now co-operate internationally to build common regulatory approaches with like-minded nations." he said.

The Parliamentary Committee's main concern is that these technologies develop at a faster rate than anything seen before, that time was  being lost and that the government needs to lay out a  formal strategy to avoid a future  dependence on a small number of  technology vendors, let alone one. 

A Department for Digital, Culture, Media and Sport spokeswoman said: “The security and resilience of 5G and other emerging technologies is a top priority and our £250 million strategy to tackle this global issue head-on is the first of its kind in the world
.. We are working at pace with international and industry partners on solutions and establishing a National Telecommunications Lab to open up new economic opportunities in mobile technology.”

UK Parliament:     ITPro:        Belfast Telegraph:      BBC:       News&Star:     Image: Unsplash

You Might Also Read:

5G Will Disrupt Cyber Security:

Google Blocks Huawei From Android:

« Get Your Cyber Security Plan In Place Now
3D Secure Authentication: What Is it, And Why Do I Need It? »

Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Hdac Technology

Hdac Technology

Hdac Technology's mission is to create a frictionless experience for all transactions using blockchain technology by improving current services and building new blockchain applications.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.