Home new
 

Keywords :   


Tag: new

BT backs quantum security for 5G in new trial

2020-11-18 01:00:00| Total Telecom industry news

For most of us, quantum computing is a concept straight out of science fiction – a futuristic technology that belongs in a movie, not real life.   But, as so often happens, the technology that was once deemed fantasy is becoming a reality, with real-world applications for quantum technologies not as far away as one might imagine.   Today, BT’s new AIRQKD trial is attempting to apply the latest quantum security techniques to 5G mobile network…read more on TotalTele.com »

Tags: in new security trial

 

Bouygues Telecom and IBM to launch Open Lab 5G for new use cases

2020-11-17 01:00:00| Total Telecom industry news

Back in October, France finally completed its long-awaited 5G spectrum auction, giving the nation’s operators the spectrum they needed to begin the commercial launches of the new technology.    For Bouygues Telecom, who obtained 70 MHz of spectrum in the auction, this launch is just around the corner…read more on TotalTele.com »

Tags: new use open cases

 
 

Hyundai to offer 10 electrified models by end of 2022; 7 SUV, 3 car models; new Ioniq 5 and 6

2020-11-12 10:55:39| Green Car Congress

Tags: and new end offer

 

Zero Trust security will be key in the new normal

2020-11-09 20:49:52| The Webmail Blog

Zero Trust security will be key in the new normal nellmarie.colman Mon, 11/09/2020 - 13:49   This time last year, I was planning an overseas vacation to Mount Fuji in Japan. Prior to booking that trip, I had met with a large traditional insurance organization to discuss the merits of cloud security. The organizations IT structure had been the same for the last 15 years, powered by on-premises server infrastructure. The teams position was firm: Why fix something thats not broken? The team was most skeptical about data security in the cloud. Outside of the organizations walled garden, they didnt believe it was possible to ensure data confidentiality and integrity. However, despite their apprehension, they agreed to start their cloud journey over the course of the next few years.      Adjusting to a new normal [Because of COVID-19], we saw two years of digital transformation in two months. Satya Nadella, Microsoft CEO   Fast forward to 2020. COVID-19 has challenged the norms for organizations around the world. From an IT standpoint, weve also been forced to work differently. Where choices had been a balance of doing it right versus keeping the business afloat, COVID tipped the balance toward staying afloat. As a result, businesses were forced to make unprecedented, risky changes in an instant. COVID-19 was a major shock for traditional enterprises. For many, continuity planning had only been theoretical and never properly tested. The walled garden security strategy finally broke, creating a hindrance in this new normal. VPNs were suddenly overwhelmed, causing significant usability problems. The traditional enterprise is in a better state today, but not without drastic and potentially risky changes to their security stance.   Now a good chunk of your critical assets are behind the firewall, but all of your employees are not. Christopher Kenesssey, NetMotion CEO   Businesses that were well into executing on their cloud strategy pre-COVID-19 are faring better than those that werent. This is because those businesses had the opportunity to strategize and prepare for the new normal before it arrived. As IT teams around the world pivot toward remote and distributed services, a new model of security is needed. The Zero Trust security strategy is best aligned to provide security across environments.   What is Zero Trust security? Never trust, always verify. The view of Zero Trust security is that we should not trust anything inside or outside of our system perimeters. The strategy enforces the lowest common denominator of trust zero.  As we begin to blur the boundaries between trusted and untrusted, Zero Trust security becomes more relevant. Not owning your cloud-based infrastructure or having end-users connect via untrusted, BYOD devices means not trusting anything without verification users, devices or systems. Contrast this against the traditional walled garden or perimeter approach, where a clearly defined firewall perimeter exists between trusted and untrusted. People, data or systems in the perimeter are considered trusted and anything outside of that is untrusted. Traditional security approaches simply dont work in a world where cloud and remote services are now the rule, not the exception.   Zero Trust security principles Zero Trust security is a strategy, a mindset and an incremental journey for IT security. While there are technologies and products to help with achieving Zero Trust, it is not a specific technology or product. Instead of a rip and replace of your current IT security, Zero Trust augments and enhances your current security strategy.  The key principles of Zero Trust security are: Verify explicitly: Authenticate and authorize based on all available data points (identity, location, device health and an AI/ML derived behavior baseline). Use least-privileged access: Provide just-in-time and just-enough access to the user. Assume breach: Constantly think about breach scenarios including post-breach attacker lateral movement, and work to prevent these scenarios. For example, ensure end-to-end encryption between sessions, leverage micro segmentation, and maintain security analytics to provide a deeper view of threats.   A comprehensive Zero Trust security strategy applies those principles to provide end-to-end protection across your IT components and digital estate, including: Identities: People and services accessing the system. Devices: Devices used to access services, such as BYOD devices. Applications: Applications and APIs that consume services. Data: Information that sits in parallel with applications. Infrastructure: Platforms that provide the environment to host these components (cloud VMs, servers or containers). Networks: Links that allow these components to interact.   Start your Zero Trust security journey We were lucky enough to go on our Japan holiday before COVID-19 took over the world. On that trip, my wife, an avid snowboarder, convinced me to try snowboarding. I thought that I would hate it due to my poor hand-eye coordination.  We started on the beginners slope, where my wife taught me how to turn and stop. Though it initially felt counter-intuitive, I managed to keep my feet locked on the board and maintain my balance. Soon after, we transitioned to more advanced skills like flat-spins and small jumps. It was great! I quickly transitioned to more advanced courses on the slopes. The Zero Trust security journey follows a similar path of learning, practice and confidence. Start with a specific use case within your organization and rethink it in the context of Zero Trust security. Slowly expand your approach across more use cases to increase the maturity of Zero Trust in your organization. How do you rethink security architecture and processes in the context of Zero Trust security? Start by taking our free, online Cybersecurity Risk Self-Assessment to uncover common security gaps in minutes.   Zero Trust security will be key in the new normalTo best protect the increasing numbers of remote users and devices, organizations need a Zero Trust security posture. Read on to find out what that means and where to start. Know your cybersecurity risk score. /node/21749Take the assessment

Tags: new key security normal

 

H&M uses warming technology for new line

2020-11-09 10:34:00| Daily apparel & textile news and comment - from just-style.com

Swedish fashion retailer H&M has launched a range of men's layering pieces that use lightweight technology for warmth.

Tags: new line technology warming

 

Sites : [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] next »