Why we need more 5G cyberhacks

February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Spotlight

Computer Troubleshooters

People and Businesses around the world depend on Computer Troubleshooters. We’re the “computer experts” . . . the people to call when your computer breaks down, when your machine or software needs to be upgraded, when viruses attack and even when you’re about to throw your computer out the window.

OTHER ARTICLES

A new era of automation with Cisco ACI and the Citrix ADC Manager app

Article | February 12, 2020

Since it was first available, Citrix has worked with Cisco Application Centric Infrastructure (ACI) to integrate Citrix ADC with the Cisco Application Policy Infrastructure Controller (APIC). As a valued technology partner, Citrix has a device package — a software module — that enables users to configure the Citrix ADC directly from a Cisco APIC. This setup has run in many customer production environments over the years. Let’s consider one of those customers — Jim. He was the first to deploy the integrated solution in his data center. The solution gave him the automation he needed and a single view to configure, deploy, and manage applications. However, his application admins preferred to use the Citrix ADC user interface to manage L4-L7 services.

Read More

Storage made simple for hybrid multicloud: the new IBM FlashSystem family

Article | February 12, 2020

In part one of this blog post series, we discussed IBM’s approach for delivering innovation while simplifying your storage infrastructure, reducing complexity, and cutting costs. Now let’s take a closer look at the details of the new IBM FlashSystem family, a single platform designed to simplify your storage infrastructure, reduce complexity and cut costs, while continuing to deliver extensive innovation for your enterprise class storage solutions and your hybrid multicloud environments.

Read More

We Need to Talk About ‘Cloud Neutrality’

Article | February 10, 2020

We spent a lot of years talking about net neutrality the idea that the companies that provide access to the internet shouldn’t unfairly block, slow down, or otherwise interfere with traffic even if that traffic competes with their services. But there’s an even bigger issue brewing, and it’s time to start talking about it: cloud neutrality. “While its name sounds soft and fluffy,” Microsoft president and general counsel Brad Smith and coauthor Carol Ann Browne write in their recent book, Tools and Weapons: The Promise and the Peril of the Digital Age, “in truth the cloud is a fortress.” Their introduction describes the modern marvel of the data center: a 2 million-square-foot, climate-controlled facility made up of colossal electrical generators, diesel fuel tanks, battery arrays, and bulletproof doors

Read More

Why enterprises are going all-in on hyperscale

Article | February 10, 2020

Cloud computing continues to dominate the technology space, with cloud migration yielding a rain of opportunities and benefits. To date, achieving massive scale in computing power and data storage is a priority for organizations looking to mature in digital transformation. Hyperscale infrastructure is designed exclusively for that purpose, and it offers increasingly relevant features such as high levels of performance and high tolerance and room for error as well as redundancy. A recent report showed enterprises are leaning towards hyperscalers for cloud services as compared to second-tier providers.

Read More

Spotlight

Computer Troubleshooters

People and Businesses around the world depend on Computer Troubleshooters. We’re the “computer experts” . . . the people to call when your computer breaks down, when your machine or software needs to be upgraded, when viruses attack and even when you’re about to throw your computer out the window.

Events