DoS Attack Vulnerability – Denial of Service Attacks on 5G Networks

Read more

The 4G/5G interworking – breaking vendor lock-in

The 4G/5G interworking – breaking vendor lock-in This article originally appeared in Voice and Data 4G and 5G will continue to co-exist for a long time to come. Even after 5G launches, 4G will still account for more than half of all connections for the next few years. However, telcos can advance transition from 4G […]

Read more

5G Network Slicing Vulnerability: Location Tracking Attacks

Read more

Enea’s new private 5G Applications deployed in Asia is powering industry 4.0 use cases

Enea’s New Private 5G Applications Deployed in Asia, Powering Industry 4.0 Use Cases East Asia has some of the most technologically advanced industries in the world. It is also said to have performed better at managing the Covid-19 crisis and as the region recovers, its enterprises are leapfrogging their global counterparts with private 5G enterprise […]

Read more

It’s not too early to lay the foundations for 6G

It’s not too early to lay the foundations for 6G Is it too early to start talking about 6G? After all, most mobile operators are still building out and fine-tuning their 5G networks. “We just put 5G in,” Verizon CTO Kyle Malady said in December 2020, “there’s a lot of development still to come on […]

Read more

A new approach is needed for policy and charging in 5G

A new approach is needed for policy and charging in 5G This thought leadership byline originally appeared in RCR Wireless Globally, telecoms spent over $8 billion in 5G infrastructure last year, while in the U.S. alone operators spent more than $80 billion on 5G spectrum. The key to unlocking a return on investment will depend […]

Read more

Encrypted Traffic – A challenge for operators

Encrypted Traffic – A Challenge for Operators This article originally appeared in BISInfotech India. Currently, over 85% of traffic on mobile networks is encrypted and operators have relied on traditional optimization technology to manage this so far. Data originating from OTTs are layered with encryption protocols like QUIC. As such, when mobile users want to […]

Read more

How to escape vendor lock-Ins in 4G/5G

How to escape vendor lock-Ins in 4G/5G This article originally appeared in Telecom Review Out with the old and in with the new? Not when it comes to 5G. Although mobile operators are rapidly deploying 5G standalone (SA) networks, they cannot sunset their 4G networks anytime soon because consumers and businesses still use LTE. The […]

Read more

Cybersecurity for a Cloud-First, Work-from-Home World (Part 2)

Cybersecurity for a Cloud-First, Work-from-Home World (Part 2) An Interview with Joe Green, Global Director, Solution Architects, Netskope The number of employees working from remote locations has skyrocketed since the outbreak of the coronavirus pandemic. This massive shift has accelerated the use of cloud applications and services, along with an increase in risky behaviors and […]

Read more

Cybersecurity for a Cloud-First, Work-from-Home World (Part 1)

Cybersecurity for a Cloud-First, Work-from-Home World (Part 1) An Interview with Joe Green, Global Director, Solution Architects, Netskope Key takeaways There are risks associated with a remote workforce and the at-home use of business devices and IoT devices, but the right tools are available now to continuously manage these risks. There is an ongoing increase […]

Read more