Huawei 5G Risk Can Be ‘Contained’

The UK security chiefs have said that the risk of using Huawei superfast 5G technology could be contained despite US warnings about opening the network to potential Chinese cyber-espionage. 

Alex Younger, The Head of MI6 Intelligence (pictured), recently talked about issues regarding Huawei Chinese company but said it was "a more complicated issue than 'in or out'". The US has reportedly been pressuring the UK and other allies not to use Huawei technology for critical infrastructure, arguing that it could be used by  the Chinese state when they spy.

Huawei has said its technology has already been used for parts of the 4G mobile network and that it is not owned by the Chinese government but, by its employees and not the Chinese government. But US, Australia and New Zealand are already blocking Huawei’s equipment as part of 5Gnetworks. However, GCHQ’s National Cyber Security Centre, says that the security risk from the Chinese government can be dealt with. 

The UK may be testing its own and Five Eye systems by not banning Huawei from supplying 5G technology. Talking in February at a security conference in Munich, Sir Alex Younger, the MI6 chief, said that the issues where complicated but that banning might not be necessary.

A NCSC spokesperson said: “The National Cyber Security Centre is committed to the security of UK networks, and we have a unique oversight and understanding of Huawei engineering and cyber-security.

“As was made clear in July’s Huawei Cyber Security Evaluation Centre (HCSEC) oversight board, the NCSC has concerns around Huawei’s engineering and security capabilities. We have set out the improvements we expect the company to make.

“The latest Annual HCSEC report will be published in the near future.”

In Britain, BT and Vodafone have already suspended the use of the company's components in their networks. Huawei, which is the world's biggest producer of telecoms equipment, denies that its equipment is a security risk.

Guardian

You Might Also Read: 

Canada Is Suspicions Of Huawei:


 

 

« Police Lure Youngsters Into Cyber Crime
Your Employees Are The Major Risk To Cyber Security »

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How to design a least privilege architecture in AWS

WEBINAR: How to design a least privilege architecture in AWS

Tuesday, April 14, 2020 - Join SANS and AWS Marketplace to learn about how to design a least privilege architecture in AWS.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Go Cyber

Go Cyber

Go Cyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Imprivata

Imprivata

Imprivata's authentication, access management and secure communications solutions for healthcare improve provider productivity for better focus on patient care.

Regulus Cyber

Regulus Cyber

Regulus enables drones, robots and autonomous vehicles to operate safely, without malicious or accidental interference to the operation of their mission.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

CaliberDLT

CaliberDLT

CaliberDLT provides quality assurance, automation, security audits and development services for blockchain technology.