article thumbnail

Nokia, Telenor invest to address new enterprise security threats

TM Forum

As 5G and B2B services for vertical industries start to take deeper root, Nokia and Telenor are among the companies launching new initiatives to protect enterprise systems from emerging security threats. a new security software joint venture. Nokia’s initiative is. an end-to-end 5G cybersecurity lab in the US.

article thumbnail

The impact of 5G and cloud on telco capex and opex

TM Forum

Despite some high visibility news stories from operators, such as Vodafone pushing for its electrical energy to be 100% from renewable sources, overall power consumption by the industry is rising along with its cost. The next generation of CSPs will not go it alone, on service models, on go-to-market strategies or on network build.

Cloud 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

8 signs you’ve mistimed a major IT initiative

CIO Business Intelligence

Therefore, most CIOs focus on business-critical operations, since maintaining existing enterprise systems is a top priority. Knowing where to focus your negotiation energy on getting the lowest price is key to staying within budget and making sure you don’t have to make trade-offs later, which will mistime the initiative.”

article thumbnail

What is the best blockchain for smart contracts and why?

Dataconomy

” The answer is never straightforward, as the choice of blockchain will depend on a range of factors, including the specific use case, performance requirements, and security considerations. Blockchain technology provides a secure and tamper-proof system that enables peer-to-peer transactions without the need for intermediaries.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences.

System 52