Guillaume Poupard, the head of French cybersecurity agency ANSSI, told the newspaper that the government planned to advise French companies to avoid using Huawei equipment in the rollout of 5G networks, but would not place a complete ban on Huawei.
When the mobile communications industry started its long evolution to the 5th generation (5G), one of the early significant applications identified was broadcasting. 5G was seen as equally applicable for both delivery of content and its production, notably for outside broadcast but also in a studio. However, this low hanging fruit has yet to start ripening in any serious way.
“There are some deployments we can point to, but on the whole what we are seeing are complementary applications rather than 5G being ready for any meaningful distribution of media content,” Peter MacAvock, Head of Delivery, Platforms and Services at the European Broadcasting Union’s Technology and Innovation Division told EE Times.
Nearly 40 civil rights, privacy and technology groups sent a letter to congressional leadership Thursday pushing for a federal moratorium on facial recognition technology.
The organizations — including the American Civil Liberties Union (ACLU), the Algorithmic Justice League and the Georgetown Law Center on Privacy and Technology — called on Washington to pass legislation on the issue, suggesting the Facial Recognition and Biometric Technology Moratorium Act introduced last week.
The bill would prohibit the use of facial recognition by all federal groups, a ban that could only be lifted by an act of Congress.
The Federal Communications Commission (FCC) on Tuesday formally designated Chinese telecommunications groups Huawei and ZTE as national security threats, blocking them from accessing FCC funds.
The move was the formalization of a unanimous decision by the FCC in November to ban U.S. telecom groups from using the FCC’s $8.3 billion Universal Service Fund to purchase equipment from companies deemed threats.
Australia will recruit 500 cyber spies and build on its offensive capabilities to take the online fight overseas in a $1.3 billion funding boost, amid rising tensions with China and a growing wave of attacks against the nation’s critical infrastructure.
The inspector general for NASA notes resource constraints and a lack of awareness about information security policies and procedures by personnel are among the reasons behind continued ineffectiveness of the agency’s information security program.
The IG’s office has identified IT security and governance as a top management and performance challenge for the agency in annual reports going back to 2011.
For example, in reviewing the Agency Common Control (ACC) system, “which aggregates and manages common controls across all Agency information systems,” the IG found 94 of 203 common controls—46%—that NASA had assessed as “other than satisfied,” or deficient.
Among those were mechanisms to protect the agency’s systems from malicious code with automatic updates.
Twenty years later, after top jobs in everything from homeware to power plants, Lundmark will return to the Finnish equipment vendor at which he spent the whole of the 1990s. When he quit the firm, he was senior vice president of marketing on the Internet side. He re-joins in August, a month sooner than originally planned, as CEO.
His start date was officially brought forward today after Fortum, the energy company Lundmark is leaving behind, found a replacement who could start on July 1. Lundmark will have to quickly clear his mind of electric vehicle charging, soil remediation and hydroelectric power. A crash course in 5G, optical networks and cloud-native software will be his first priority.
The water facility attack was to release large amounts of poisonous chlorine into Israel’s water delivery infrastructure, potentially poisoning tens of thousands of Israelis. It may indicate a growing threat of cyber attack throughout the world.
FireEye, a publicly traded cyber security company in Milpitas, California, determined that the malware developed for this kind of attack came out of Russia and specifically from the Central Scientific Research Institute of Chemistry and Mechanics, a Russian government-owned technical research institution in Moscow.
Officials of the Naval Information Warfare Systems Command in San Diego are asking for industry’s help to support the Vulnerability Remediation Asset Manager (VRAM), a web-based information security repository for network configuration data.
VRAM catalogs network configuration data to ensure compliance to technical directives and mitigate against known vulnerabilities. Some of the new requirements for tools include the ability to be hosted on .mil domains, the ability to parse large files and the capacity to work with other parts of the cybersecurity infrastructure.
The Trump administration has determined that top Chinese firms, including telecoms equipment giant Huawei Technologies and video surveillance company Hikvision (002415.SZ), are owned or controlled by the Chinese military, laying the groundwork for new U.S. financial sanctions.
The DOD document also includes China Mobile Communications Group (0941.HK) and China Telecommunications Corp [CTTTC.UL] as well as aircraft manufacturer Aviation Industry Corp of China [SASADY.UL].
The designations were drawn up by the Defense Department, which was mandated by a 1999 law to compile a list of Chinese military companies operating in the United States, including those “owned or controlled” by the People’s Liberation Army that provide commercial services, manufacture, produce or export.