TECHNOLOGY > Key Areas > 5G Networks


« Back to News

2020-03-04

Japan Approves Home Grown 5G

Japan intends to accelerate the development of 5G networks and will give financial support to local companies building this important new technology.

2020-02-12

Is Widespread Suspicion Of Huawei Justified?

British MPs are opposing the decision to allow untrusted Huawei access to 5G infrastructure, whilst China insists it has nothing to do with them.

2020-02-07

What Is The Fuss About 5G?

The next generation of mobile Internet connection offers much faster data download and upload speeds. But there is more to it than that.

2020-01-29

Britain Allows Huawei 5G Network Access Against US Advice

The UK Government has decided to give the contoversial Chinese company a significant role in building the UK’s 5G mobile and data network.

2020-01-21

5G Will Reduce Car Accidents

Connected car systems with 5G will enable data sharing to improve the effectiveness of advanced driver assistance systems and to save lives.

2020-01-20

Can A 5G Network Really Be Secure?

Governments in Australia, Britain and Germany are in difficulty over the choice of technology suppliers to establish their national 5G networks.

2019-11-27

Tracking 5G Protocol Flaws

Researchers have identified various security flaws in the 5G communications protocol. These include user tracking, eavesdropping and spurious billing.

2019-10-24

Happy Days Ahead For 5G Hackers

Fifth-generation mobile networks are going live with greatly improved latency & bandwidth. They also offer hackers greatly more potential for attack.

2019-10-22

Cybersecurity And The EU's Regime For 5G Networks

The powerful new features of 5G networking will bring numerous security challenges. A lot will depend on regulatory compliance. By Joao Paro

2019-09-28

Huawei Will Sell Its 5G Know-How

Huawei wants to address the widespread concerns over the integrity of its 5G network technology by licensing it to EU and US competitors.

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CyberArk Software

CyberArk Software

CyberArk is an established leader in privileged access management and offers the most complete set of Identity Security capabilities.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau

Lithuanian National Accreditation Bureau is the national accreditation body for Lithuania. The directory of members provides details of organisations offering certification services for ISO 27001.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.