Huawei 5G Risk Can Be ‘Contained’

The UK security chiefs have said that the risk of using Huawei superfast 5G technology could be contained despite US warnings about opening the network to potential Chinese cyber-espionage. 

Alex Younger, The Head of MI6 Intelligence (pictured), recently talked about issues regarding Huawei Chinese company but said it was "a more complicated issue than 'in or out'". The US has reportedly been pressuring the UK and other allies not to use Huawei technology for critical infrastructure, arguing that it could be used by  the Chinese state when they spy.

Huawei has said its technology has already been used for parts of the 4G mobile network and that it is not owned by the Chinese government but, by its employees and not the Chinese government. But US, Australia and New Zealand are already blocking Huawei’s equipment as part of 5Gnetworks. However, GCHQ’s National Cyber Security Centre, says that the security risk from the Chinese government can be dealt with. 

The UK may be testing its own and Five Eye systems by not banning Huawei from supplying 5G technology. Talking in February at a security conference in Munich, Sir Alex Younger, the MI6 chief, said that the issues where complicated but that banning might not be necessary.

A NCSC spokesperson said: “The National Cyber Security Centre is committed to the security of UK networks, and we have a unique oversight and understanding of Huawei engineering and cyber-security.

“As was made clear in July’s Huawei Cyber Security Evaluation Centre (HCSEC) oversight board, the NCSC has concerns around Huawei’s engineering and security capabilities. We have set out the improvements we expect the company to make.

“The latest Annual HCSEC report will be published in the near future.”

In Britain, BT and Vodafone have already suspended the use of the company's components in their networks. Huawei, which is the world's biggest producer of telecoms equipment, denies that its equipment is a security risk.

Guardian

You Might Also Read: 

Canada Is Suspicions Of Huawei:


 

 

« Police Lure Youngsters Into Cyber Crime
Your Employees Are The Major Risk To Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Green Hills Software

Green Hills Software

Green Hills Software is the largest independent vendor of embedded secure software solutions for applications including the Internet of Things.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

Praxis Security Labs

Praxis Security Labs

Praxis Security Labs is a research driven cybersecurity company that helps our customers to reduce risk and improve security.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Onum

Onum

Onum helps security and IT leaders focus on the data that's most important. Gain control of your data by cutting through the noise for deep insights in real time.