Application Security Architecture Authentication
CertificationsCorporate ComplianceCryptology
Disaster RecoveryEnterprise SecurityExploits
FirewallsIncident HandlingIntrusion Detection
OS SecurityPolicies and ProceduresSecurity Basics
Security ManagementSecurity ToolsServers
StandardsVoIPVulnerability Management
Web SecurityWiFi SecurityWorms and Viruses

5G Security

by Ericsson

5G systems are the next step in the evolution of mobile communication and will be a fundamental enabler for the Networked Society. This development creates new security scenarios and requires new security solutions.
As a result, there is a need for a fundamentally new, multi-actor trust model that allows more flexibility. Security for virtualized networks and services should be considered. Attack-resistance and data security must represent basic design criteria for new protocols, while security assurance and compliance have to be more verifiable and measurable. Tackling these challenges will require new tools such as network slicing, trusted computing and alternative ways of handling user identities.
» Read more

Managing Security Risks in Wireless Networks

WiFiNetwork

by Michelle Sellers

This is 2017 and wireless networks are an important part of the structure in nearly every business. Unfortunately they are also a large vector for attackers to compromise vulnerabilities in a system that hasn’t been secured properly. This whitepaper will discuss the inherent vulnerabilities of a wireless network and ways to manage and mitigate these risks properly.
» Read more