Wireless security in LTE networks

June 6, 2012

When using smartphonesto make a call, socialize with friends, check traffic or watch a video, few subscribers are concerned about security – of the device, of the content or of the network. They are more likely to be concerned about having good coverage, a fast connection or sufficient battery life than whether their mobile data traffic is protected. The mobile security record to date has been quite good. Because voice-dominated networks have been built on proprietary interfaces, mobile networks have been difficult to penetrate, and have provided less incentive for malicious attacks than the more open and data-rich IT networks.

Spotlight

PGI Cyber

PGI Cyber is an integrated cyber-security solutions provider bringing together a unique capability in the vast field of information security, applicable across the commercial, governmental and institutional sectors.

OTHER WHITEPAPERS
news image

How Healthcare Can Boost Cyber Security and Close Its Defense Gaps

whitePaper | May 22, 2022

Hackers have made healthcare a top target. As a result, the healthcare industry experienced the highest number of ransomware attacks during Q3 2022, with one in 42 healthcare organizations suffering an attack – in spite of an 8 percent drop in ransomware attacks in Q3.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Intel® Converged Security and Management Engine (Intel® CSME) Security

whitePaper | October 26, 2022

Intel platforms are designed with a strong built-in security foundation. This allows the ecosystem partners to help protect the platform data and to build more trusted applications.

Read More
news image

Adobe Acrobat with Document Cloud Services Security Overview

whitePaper | October 26, 2022

At Adobe®, we know the security of your digital experiences is important. Security practices are deeply ingrained into our internal software development and operations processes and tools and are rigorously followed by our cross-functional teams to prevent, detect, and respond to incidents in an expedient manner.

Read More
news image

The State of Mobile App Security 2022

whitePaper | July 28, 2022

Mobile apps have become key tools for businesses to serve customers, earn revenue, and enable remote work by employees. Over the last two years, mobile apps have become critical to success for the majority of businesses.

Read More

Spotlight

PGI Cyber

PGI Cyber is an integrated cyber-security solutions provider bringing together a unique capability in the vast field of information security, applicable across the commercial, governmental and institutional sectors.

Events