One of the main takeaways from the Mobile Network Security Strategies event that Light Reading just hosted in London was the dizzying array of issues that communications network security managers now have to consider.
With Heavy Reading senior analyst and mobile network security specialist Patrick Donegan to guide them, speaker after speaker provided insights into the various challenges now facing wireless network operators as they build out their all-IP 4G LTE networks, and also advised how to identify and mitigate the various threats.
New ways of thinking are also required. In a recorded video keynote presentation, AT&T Inc. (NYSE: T) Chief Security Officer Ed Amoroso noted that the world has moved on from the construction of "perimeter" security defenses designed to stop external threats entering through a defined network edge.
Those perimeters no longer exist: there is no outside and inside -- every connected device is a de facto extension of the network. In addition, every smartphone app is capable of damaging network integrity. And just wait until machine-to-machine (M2M) really takes off and the Internet of Things (IoT) becomes a reality…
Check out the various insights into this increasingly important topic, including a video interview with EE 's director of technical security Peter Erceg, at our special Industry Show News site.
SachinEE, User Rank: Light Sabre 5/28/2014 | 12:04:38 PM
Re: M2M Security This is an interesting but again a frightening idea. To imagine that living in a 4g M2M world where your enemies could hack into your car to cause an accident or even into your refrigerator to poison you at any time through the Machine to machine technology is an obscenity. I think software developers working on this technology should work on measures to ensure that once this M2M technology sets foot in the market; complaints to do with the integrity and safety of people's private information are completely nailed down.
kq4ym, User Rank: Light Sabre 5/26/2014 | 6:07:08 PM
Re: M2M Security The security issue may not be a current worry now, but as M2M is more widely employed the threat issue is certainly going to be a big one. And we though we were in trouble with viruses on our laptop, wait til our refrigerator gets attacked!
Light Reading founder Steve Saunders recently visited the University of North Carolina Charlotte (UNCC) where Cisco's Tetration application is providing data center analytics, simplifying SDN, helping with cloud migration and overseeing white-list security policy.
A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.