5G security assessment becoming standardised

Mobile operators have to keep their network secure. But how do they know if they’re succeeding?

Intelligence at the edge drives business optimisation

ROI is an area that must be carefully considered when implementing intelligent edge technologies

What AI can (and can’t) do for organisations’ cyber resilience

AI is a double-edged sword that can aid organisations and the criminals attempting to breach their defences…

Huawei’s top-down design principles for 5G cyber security

By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - Huawei’s 5G cyber security follows the design principles of defense in depth, Zero-trust@5G, and adaptive security, which collaboratively provide a systematic, dynamic, and...

Multi-party collaboration and shared responsibility for 5G security

By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - 5G cyber security can be divided into three layers based on the security model in the communications industry: application security, network security, and product security (in...

AR and VR in action on the ISS

AR and VR in action on the ISS

AR and VR in action on the ISS, New directions for the data centre, join the move to hybrid multi-cloud, Africa ripe for investment and managing the post-Covid workforce.