Huawei 5G Risk Can Be ‘Contained’

The UK security chiefs have said that the risk of using Huawei superfast 5G technology could be contained despite US warnings about opening the network to potential Chinese cyber-espionage. 

Alex Younger, The Head of MI6 Intelligence (pictured), recently talked about issues regarding Huawei Chinese company but said it was "a more complicated issue than 'in or out'". The US has reportedly been pressuring the UK and other allies not to use Huawei technology for critical infrastructure, arguing that it could be used by  the Chinese state when they spy.

Huawei has said its technology has already been used for parts of the 4G mobile network and that it is not owned by the Chinese government but, by its employees and not the Chinese government. But US, Australia and New Zealand are already blocking Huawei’s equipment as part of 5Gnetworks. However, GCHQ’s National Cyber Security Centre, says that the security risk from the Chinese government can be dealt with. 

The UK may be testing its own and Five Eye systems by not banning Huawei from supplying 5G technology. Talking in February at a security conference in Munich, Sir Alex Younger, the MI6 chief, said that the issues where complicated but that banning might not be necessary.

A NCSC spokesperson said: “The National Cyber Security Centre is committed to the security of UK networks, and we have a unique oversight and understanding of Huawei engineering and cyber-security.

“As was made clear in July’s Huawei Cyber Security Evaluation Centre (HCSEC) oversight board, the NCSC has concerns around Huawei’s engineering and security capabilities. We have set out the improvements we expect the company to make.

“The latest Annual HCSEC report will be published in the near future.”

In Britain, BT and Vodafone have already suspended the use of the company's components in their networks. Huawei, which is the world's biggest producer of telecoms equipment, denies that its equipment is a security risk.

Guardian

You Might Also Read: 

Canada Is Suspicions Of Huawei:


 

 

« Police Lure Youngsters Into Cyber Crime
Your Employees Are The Major Risk To Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

ValueMentor

ValueMentor

ValueMentor is a leading cyber security service provider in the Middle East. We enable clients to reduce risk by taking a strategic approach to cybersecurity.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

VanishID

VanishID

VanishID (formerly Picnic) is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Chugach Government Solutions (CGS)

Chugach Government Solutions (CGS)

CGS performs work for the Federal Government across 4 unique core lines of business, including: Facilities Management and Maintenance, Construction, Technical IT and Cyber Services, and Educational Se

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

CyberGrape

CyberGrape

CyberGrape is a client centric managed services company, providing enterprise leading security solutions and helping companies through their IT risk and security challenges.

Octopus Cybersecurity

Octopus Cybersecurity

Octopus VAR is a Validation, Analysis and Reporting tool that gives risk managers and CISOs a powerful control mechanism and a deep view of operational risks.