British Parliament Wakes Up To Huawei

The Westminster Parliament's Science and Technology Committee has urged the Government to plan for other emerging technologies to avoid the row over 5G and Huawei equipment and they have released a report highlighting the UK's dependence on just two 5G vendors, which it claims, poses a risk to national security. 

The proposals are in response to the deployment of 5G in the UK, which saw Chinese firm Huawei ultimately excluded from the process on security grounds, leaving the country reliant on only two equipment vendors while causing a likely delay to the full installation of 5G networks.

While the government did eventually act on expert security advice and banned Huawei’s 5G the legislation took so long that it left the UK with just Ericsson and Nokia as 5G partners. The 5G strategy has come too late and will take years to achieve any success, according to MP Greg Clark, who is the committee's chair.  "A lack of strategic foresight in 5G has seen the UK become dependent on only two vendors for a crucial technology...We must learn from this experience to avoid making our economy and security vulnerable from a lack of acceptable alternatives in emerging technologies."Clark said. 

Advances in Artificial Intelligence (AI) and Quantum Computing are examples of emerging technologies that, like 5G, can be potential threats to personal and national security.

Greg Clark called for a clear, proactive strategy to avoid a similar situation to the Huawei saga, criticising the UK government's 5G diversification strategy. "The government needs to take an activist approach to encourage research and development, and must now co-operate internationally to build common regulatory approaches with like-minded nations." he said.

The Parliamentary Committee's main concern is that these technologies develop at a faster rate than anything seen before, that time was  being lost and that the government needs to lay out a  formal strategy to avoid a future  dependence on a small number of  technology vendors, let alone one. 

A Department for Digital, Culture, Media and Sport spokeswoman said: “The security and resilience of 5G and other emerging technologies is a top priority and our £250 million strategy to tackle this global issue head-on is the first of its kind in the world
.. We are working at pace with international and industry partners on solutions and establishing a National Telecommunications Lab to open up new economic opportunities in mobile technology.”

UK Parliament:     ITPro:        Belfast Telegraph:      BBC:       News&Star:     Image: Unsplash

You Might Also Read:

5G Will Disrupt Cyber Security:

Google Blocks Huawei From Android:

« Get Your Cyber Security Plan In Place Now
3D Secure Authentication: What Is it, And Why Do I Need It? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

Mitol PerfectBackup

Mitol PerfectBackup

Mitol PerfectBackup provide Enterprise Online Backup, Disaster Recovery and Cloud Computing Services.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

SensCy

SensCy

SensCy is a Trusted Guide for Sensible Cybersecurity for small and medium-sized organizations.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.