Tag: ARTICLE
The telecoms and digital technologies sectors are notoriously jargonised. Eavesdrop on any conversation at an industry conference (remember those?) and you’d be treated to...
It's been a year of contradictions for the telecommunications industry.
Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic,...
In the recent report by IHS Markit - "The 5G Economy - How 5G will contribute to the global economy" - researchers claimed that...
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind....
The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn...
Targeted disinformation poses a significant threat to societal trust, democratic processes, and individual well-being. The use of AI in these disinformation campaigns enhances their precision, persuasiveness, and impact, making them more dangerous than ever before. By understanding the mechanisms of targeted disinformation and implementing comprehensive strategies to combat it, society can better protect itself against these sophisticated threats.
In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment...
In a major milestone for 5G, 3GPP finalized the Release 16 in July - its second set of specifications for 5G New Radio (NR)...
Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased interest and investment from both the public and private sectors.
No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is certainly the most scrutinized. But the recent UDG source...
For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as...
There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast.
The disease has...
Quantum Key Distribution (QKD) represents a radical advancement in secure communication, utilizing principles from quantum mechanics to distribute cryptographic keys with guaranteed security.Unlike classical encryption, whose security often relies on the computational difficulty of certain mathematical problems, QKD's security is based on the laws of physics, which are, as far as we know, unbreakable.
While APIs serve as secure data conduits, they are not impervious to cyber threats. Vulnerabilities can range from unauthorized data access and leakage to more severe threats like remote code execution attacks. Therefore, it's crucial to integrate a robust security architecture that involves multiple layers of protection. Transport Layer Security (TLS) should be implemented to ensure data confidentiality and integrity during transmission. On the authentication front, OAuth 2.0 offers a secure and flexible framework for token-based authentication. Additionally, API keys should never be hardcoded into source repositories but should be managed through environment variables or secure key vaults. Other security practices such as network-level firewall configurations, IP whitelisting, and rate-limiting should be employed to defend against DDoS (Distributed Denial of Service) attacks and unauthorized data scraping.
Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not...