Huawei 5G Risk Can Be ‘Contained’

The UK security chiefs have said that the risk of using Huawei superfast 5G technology could be contained despite US warnings about opening the network to potential Chinese cyber-espionage. 

Alex Younger, The Head of MI6 Intelligence (pictured), recently talked about issues regarding Huawei Chinese company but said it was "a more complicated issue than 'in or out'". The US has reportedly been pressuring the UK and other allies not to use Huawei technology for critical infrastructure, arguing that it could be used by  the Chinese state when they spy.

Huawei has said its technology has already been used for parts of the 4G mobile network and that it is not owned by the Chinese government but, by its employees and not the Chinese government. But US, Australia and New Zealand are already blocking Huawei’s equipment as part of 5Gnetworks. However, GCHQ’s National Cyber Security Centre, says that the security risk from the Chinese government can be dealt with. 

The UK may be testing its own and Five Eye systems by not banning Huawei from supplying 5G technology. Talking in February at a security conference in Munich, Sir Alex Younger, the MI6 chief, said that the issues where complicated but that banning might not be necessary.

A NCSC spokesperson said: “The National Cyber Security Centre is committed to the security of UK networks, and we have a unique oversight and understanding of Huawei engineering and cyber-security.

“As was made clear in July’s Huawei Cyber Security Evaluation Centre (HCSEC) oversight board, the NCSC has concerns around Huawei’s engineering and security capabilities. We have set out the improvements we expect the company to make.

“The latest Annual HCSEC report will be published in the near future.”

In Britain, BT and Vodafone have already suspended the use of the company's components in their networks. Huawei, which is the world's biggest producer of telecoms equipment, denies that its equipment is a security risk.

Guardian

You Might Also Read: 

Canada Is Suspicions Of Huawei:


 

 

« Police Lure Youngsters Into Cyber Crime
Your Employees Are The Major Risk To Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Everything Blockchain

Everything Blockchain

Everything Blockchain offer solutions that transform enterprise data-management capabilities. Increased efficiency, super-charged performance and all with government grade security.

Cyderes

Cyderes

Cyderes (Cyber Defense and Response) is a global, pure-play, full life-cycle cyber security services provider formed from the merger of Herjavec Group and Fishtech Group in 2022.

SecondSight

SecondSight

SecondSight’s Vertical AI embodies a full-spectrum approach to cyber insurance, facilitating accurate digital risk profiling.