Why we need more 5G cyberhacks

| February 24, 2020

article image
How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Spotlight

InfoSystems, Inc.

Since 1994, InfoSystems has been, and continues to be, the approachable provider of reliable technology solutions for enterprise and small-to-medium sized businesses. InfoSystems is one of the fastest-growing IT, communications and software solutions providers in the Chattanooga, Nashville and Knoxville areas. A unique business-first approach layered with IT expertise has led InfoSystems to receive numerous industry and community awards.

OTHER ARTICLES

A new era of automation with Cisco ACI and the Citrix ADC Manager app

Article | February 12, 2020

Since it was first available, Citrix has worked with Cisco Application Centric Infrastructure (ACI) to integrate Citrix ADC with the Cisco Application Policy Infrastructure Controller (APIC). As a valued technology partner, Citrix has a device package — a software module — that enables users to configure the Citrix ADC directly from a Cisco APIC. This setup has run in many customer production environments over the years. Let’s consider one of those customers — Jim. He was the first to deploy the integrated solution in his data center. The solution gave him the automation he needed and a single view to configure, deploy, and manage applications. However, his application admins preferred to use the Citrix ADC user interface to manage L4-L7 services.

Read More

Edge computing-driven transformation of data, management, and applications

Article | February 12, 2020

Big name companies are investing in edge computing developments. Bruce Davie, VMware’s VP and CTO, Asia Pacific and Japan, ranked Edge Computing along with the rise of mobile devices, cloud and AI in his list of “four super powers of technology”. According to Fujitsu CTO, Joseph Reger, “It is very obvious that you need to bring intelligence closer to [IoT] devices, and for that you must have a kind of distributed intelligence and that is going to reload the opportunities for digital transformation.” With reference to Gartner saying that by 2022, some 75% the of enterprise-generated data would be created and processed outside the traditional, centralised data centre or cloud, Hewlett Packard Enterprise (HPE) committed some US$4 billion investment in intelligent edge technologies and services by 2021.

Read More

How to backup hyperconverged infrastructure

Article | February 12, 2020

Enterprises running hypervisors on hyper-converged infrastructure (HCI) systems typically have backup options available to them that are not available to those running on generic hardware. Such customers may also have additional backup challenges depending on the HCI vendor and hypervisor they have chosen. Let’s take a look.

Read More

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | February 12, 2020

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Spotlight

InfoSystems, Inc.

Since 1994, InfoSystems has been, and continues to be, the approachable provider of reliable technology solutions for enterprise and small-to-medium sized businesses. InfoSystems is one of the fastest-growing IT, communications and software solutions providers in the Chattanooga, Nashville and Knoxville areas. A unique business-first approach layered with IT expertise has led InfoSystems to receive numerous industry and community awards.

Events