TECHNOLOGY > Key Areas > 5G Networks


« Back to News

2020-09-29

BT Dumps Huawei For Nokia 5G

Nokia has signed a 5G deal with British Telecom and is set to become a major beneficiary of Huawei being blocked from the UK's 5G networks.

2020-09-30

What You Need to Know About 5G

5G Networks are the new generation of mobile internet connectivity on smartphones and other devices. What difference will 5G make to our lives?

2020-07-14

Huawei 5G Ordered Out Of UK Networks

Mobile operators will have to remove all the Chinese technology company's 5G equipment from their UK networks by 2027.

2020-07-08

British Telcos Will Be Told To Strip Huawei Out Of Their Networks

The British government has plans to stop the purchase of new Huawei gear and to remove the existing 5G equipment from the national network.

2020-06-05

US Ban On Semiconductor Exports To China Hits Huawei

The UK is expected to conclude that US export controls preventing semiconductor exports to China will stop Huawei supplying 5G equipment.

2020-05-29

Blockchain Can Improve 5G

Latency: Industry experts think that Blockchain technology has significant characteristics that could improve the speed of 5G mobile networks.

2020-04-09

No, 5G Does Not Spread Coronavirus

Conspiracy theories over a link between the roll out of 5G and the spread of coronavirus have been spreading through social media networks.

2020-04-15

5G Security: Possible Risks & Challenges

5G will be the mainstay of the future digital economy and with so much at stake network security must be flawless. By David Balaban

2020-04-07

The US Has A New 5G Security Strategy

The US intends to protect its fifth-generation wireless infrastructure at home and overseas and President Trump has laid out his plan to do so.

2020-03-27

Rapid Deployment Of 5G Is A Headache

The transition to 5G increases both the speed and volume of data communication, but there are a number of important issues which are problematic.

2020-03-09

Why 5G Technology Is A Geopolitical Issue

Innovative use of software across 5G platforms raises problems, as the technology serves to widen the attack surface of the network.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.