US Secretary of State Mike Pompeo says risk posed by use of Huawei in critical IT systems could cause US to curtail the colocation of American resources, including embassies and military outposts.
While Huawei faces sales bans from carriers and governments worldwide, the company still counts at least one supporter: James Valley Telecommunications. 'I'm a believer in being innocent until proven guilty,' said the CEO.
Tim Baxter announced on social media he is retiring from the company and will be replaced by Young Hoon Eom.
The security industry has been talking about virtualizing security so it can be distributed to protect assets, but it's now time to start acting.
There's a boom in security services, driven by demand from businesses and shaped by the ability to deliver security as a virtual network function.
Level 3 Communications' Chief Security Officer Dale Drew says service providers, manufacturers and even consumers must combine to halt botnet woes.
Neither consumers nor device manufacturers are motivated to act to halt IoT-based botnets, but ISPs likely are and they are going to need help.
Former AT&T security chief urges telecom security industry to speak up now and insist on greater understanding of what's at stake and more resources.
M&A activity in particular helps fuel security problems when 'unknown' network resources are left unprotected.
AT&T's former security guru is taking his expertise to a much broader audience – and this time he's giving it away.
Here's a look back at the highlights from the live events Light Reading held last year, including best keynote and best event.
Building on different tools including virtual functions, service providers are using the network itself as a security device.
A review of network security threats shows growth in attacks that use DDoS and other methods as smokescreens for data breaches and extortion.
Heavy Reading Chief Analyst Patrick Donegan defends network security experts as being more able to properly assess the risk of change than top carrier management.
Managed security services can handle the complexity of network security, while giving enterprises information they need for strategic decisions.
As an industry, security folks tend to play things close to the vest, but increasingly they need to be sharing information in the fight against a common enemy.
Most enterprises today don't know where their most critical data is stored or how it moves through their networks, making controlling risks much harder.
Manufacturing and production environments as well as critical infrastructure are being targeted by polymorphic attacks intended to embarrass.
Matching workloads or apps with their own security, provisioned alongside in a mixed-cloud environment, could make virtual networks safer.
Enterprises need to know what their specific risks are and therefore what they need to protect and the best way to do that, says Level 3's SVP of security.
The distributed, diverse and resilient architecture of botnets is actually a good approach for security in the virtualized world.
Network security is becoming an ever bigger deal for communications service providers and the vendor community is reacting accordingly.
Security in the cloud may not be the bugaboo that it's made out to be for mobile carriers.
AT&T's Chief Security Officer Ed Amoroso explains how his company is wrapping virtual security layers around micro network domains.
Speaking at Light Reading events, Christer Swartz cautions against trying the bolt-on security approach after-the-fact.
Ericsson says data security must move beyond a perimeter-centric approach.
Carrier now using software-based security to 'shrink-wrap' micro-domains inside its broader network perimeter.
With network and device threats, infections and attacks all on the rise, Heavy Reading Chief Analyst Patrick Donegan urges mobile operators to boost spending on security measures.
Vendor's rebranded mobile malware software, Motive Security Guardian, is now being offered in the cloud.
Rami Rahim's compensation package is smaller than his predecessor was eligible for.
Mavenir is shelling out just less than $5 million in cash and debt for Stoke, a company that grabbed $92M in VC funding in under a decade.
The buy also gets Mavenir high-profile Asian customers like NTT DoCoMo and SoftBank.
Messaging security vendor sees an opportunity to steal market share from Infloblox, Nominum and others as it tweaks its security platform for DNS.
AT&T's chief security officer explains why a whole new approach to mobile network security is needed in a world of smartphones, the cloud, and virtualization.
AT&T Chief Security Officer Ed Amoroso outlines his vision for the future of mobile network security and discusses the topic with colleagues from AT&T Labs. This video was produced by AT&T and is available to the Light Reading community courtesy of AT&T.
Citrix's Mike Bursell revealed at Light Reading's Security Show in London that he is heading to an NFV role at Intel.
The technical and strategic considerations for securing today's mobile networks are legion.
Following success in New York, the Mobile Network Security Strategies conference debuted to London.
M2M-focused operators will need to think how to secure multiple networks as IoT evolves.
EE's director of technical security Peter Erceg talks about EE's approach to securing its LTE network, how it can benefit from that, and what vendors need to be doing to help operators.
The major mobile operators are taking network security seriously and even see it as a business opportunity.
Carriers need to be more vocal on the mobile security they already provide customers, says Heavy Reading senior analyst Patrick Donegan.
Customer data stolen in security breach that could lead to phishing attacks on subscribers.
Nordic operator's chief security officer discusses the increasing security threat to communications service providers in a complex, smartphone-dominated, IP-oriented world.
Deutsche Telekom is looking to profit from the heightened awareness of data security issues post-Snowden.
Also: NSN and DT open security center; CSG offers crime-fighting software; Heavy Reading hosts a security show.
Michael Singer, associate vice president of mobile, cloud, and access management for AT&T's business solutions group, talks about the security challenges resulting from the bring-your-own-device (BYOD) trend.
An AT&T keynote address dominated the proceedings at this year's Mobile Network Security Strategies event in New York -- see who was there!
Mike Wood of Verizon Enterprise Solutions talks to Light Reading's Carol Wilson about the role of identity management in security strategies.
AT&T's chief security officer talks about the challenges facing network operators in an all-IP, 4G world.
NIST specialist worries about how intentional and unintentional GPS jamming could affect wireless networks and more.
With network operators considering numerous ways to protect their networks, customers, and services, Infoblox integrates security tools with its DSN server.
While both types of unwanted mobile device apps are growing rapidly, an industry expert sees hope in virtualization trends.
Update to smartphone app that splits the device into work and personal containers will give the device two separate phone numbers and two separate bills.
Senior Editor Sarah Reedy and I discuss what operators are doing -- and saying -- about security in a 4G, virtualized world.
Infoblox's vice president of technology says operators need to fortify the DNS as attacks increase in number and sophistication.
In which Light Reading learns some new initials: TDoS, or telephony denial of service, a future threat to 4G voice services.
Protecting customer privacy is a growing challenge for mobile service providers, and it is among the legion of security issues they face.
Talking at a Light Reading event, AT&T's chief security officer suggests that all-IP mobile networks and data in the cloud should keep operators on their toes about mobile security.
Huawei once more faces opposition in Washington to its business with an important US ally, South Korea.
It may just be getting on operators' radars, but a combination of IPsec and encryption will be necessary to protect small cells.
New Verizon cloud-based service aims to authenticate devices, services as part of M2M value chain.
Wireless operators typically suffer around five network outages a year, and they may be underestimating the role malicious attacks play in causing them, Heavy Reading finds.
Sixty percent of mobile malware infections target Android, compared with less than 1 percent on the iPhone, Alcatel-Lucent finds.
Latest LR poll suggests LTE users have a lot of concerns about the security of their 4G network.
Tradeshows can be informative and cutting-edge. They can also be boring as hell.
As data volumes grow, mobile network outages are a growing concern and can have a major impact on customer relationships.
Comptel Plus panel warns that threats are more targeted and intelligent, meaning service providers need to get their heads out of the sand and be more vigilant.
New deployments of IPsec in Europe are allaying fears of fears of high costs and negative impacts on performance.
A deal with Arbor Networks should sound pretty familiar to followers of Alcatel-Lucent