Huawei 5G Risk Can Be ‘Contained’

The UK security chiefs have said that the risk of using Huawei superfast 5G technology could be contained despite US warnings about opening the network to potential Chinese cyber-espionage. 

Alex Younger, The Head of MI6 Intelligence (pictured), recently talked about issues regarding Huawei Chinese company but said it was "a more complicated issue than 'in or out'". The US has reportedly been pressuring the UK and other allies not to use Huawei technology for critical infrastructure, arguing that it could be used by  the Chinese state when they spy.

Huawei has said its technology has already been used for parts of the 4G mobile network and that it is not owned by the Chinese government but, by its employees and not the Chinese government. But US, Australia and New Zealand are already blocking Huawei’s equipment as part of 5Gnetworks. However, GCHQ’s National Cyber Security Centre, says that the security risk from the Chinese government can be dealt with. 

The UK may be testing its own and Five Eye systems by not banning Huawei from supplying 5G technology. Talking in February at a security conference in Munich, Sir Alex Younger, the MI6 chief, said that the issues where complicated but that banning might not be necessary.

A NCSC spokesperson said: “The National Cyber Security Centre is committed to the security of UK networks, and we have a unique oversight and understanding of Huawei engineering and cyber-security.

“As was made clear in July’s Huawei Cyber Security Evaluation Centre (HCSEC) oversight board, the NCSC has concerns around Huawei’s engineering and security capabilities. We have set out the improvements we expect the company to make.

“The latest Annual HCSEC report will be published in the near future.”

In Britain, BT and Vodafone have already suspended the use of the company's components in their networks. Huawei, which is the world's biggest producer of telecoms equipment, denies that its equipment is a security risk.

Guardian

You Might Also Read: 

Canada Is Suspicions Of Huawei:


 

 

« Police Lure Youngsters Into Cyber Crime
Your Employees Are The Major Risk To Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.