TECHNOLOGY > Key Areas > 5G Networks


« Back to News

2020-03-17

Why 5G Is Going To Quickly Replace 4G

5G will unlock new applications that were simply not possible with 4G. Specifically, workplaces will no longer be defined by a physical location.

2020-03-12

5G Will Affect Jobs In 2020

5G technology will change aspects of how we work and IT technology and business executives alike must adapt to the impact on the workplace.

2020-03-06

US Increases Pressure To Stop Huawei 5G In Britain

The US does not think the UK’s decision to allow Huawei to buy 5G technology is final and is keeping up the pressure to change its mind.

2020-03-04

Japan Approves Home Grown 5G

Japan intends to accelerate the development of 5G networks and will give financial support to local companies building this important new technology.

2020-02-12

Is Widespread Suspicion Of Huawei Justified?

British MPs are opposing the decision to allow untrusted Huawei access to 5G infrastructure, whilst China insists it has nothing to do with them.

2020-02-07

What Is The Fuss About 5G?

The next generation of mobile Internet connection offers much faster data download and upload speeds. But there is more to it than that.

2020-01-29

Britain Allows Huawei 5G Network Access Against US Advice

The UK Government has decided to give the contoversial Chinese company a significant role in building the UK’s 5G mobile and data network.

2020-01-21

5G Will Reduce Car Accidents

Connected car systems with 5G will enable data sharing to improve the effectiveness of advanced driver assistance systems and to save lives.

2020-01-20

Can A 5G Network Really Be Secure?

Governments in Australia, Britain and Germany are in difficulty over the choice of technology suppliers to establish their national 5G networks.

2019-11-27

Tracking 5G Protocol Flaws

Researchers have identified various security flaws in the 5G communications protocol. These include user tracking, eavesdropping and spurious billing.

2019-10-24

Happy Days Ahead For 5G Hackers

Fifth-generation mobile networks are going live with greatly improved latency & bandwidth. They also offer hackers greatly more potential for attack.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

DomainTools

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

Redsquid

Redsquid

At Redsquid we are all about making a difference to our customers with the use of technology, as an innovative provider of solutions within IoT, Cyber security, ICT, Data Connectivity & Voice.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Davinsi Labs

Davinsi Labs

Davinsi Labs helps companies achieve Digital Service Excellence with specialized Security Intelligence and Service Intelligence solutions.