Search Results

TAG: Standards

CxO Interview: Disruption and Regulation in Global Mobile Payments

Digital economies function using at least three critical elements: The easy movement of information; the easy movement of money; and the rigorous management of identity. Founded in 2009, Boku is no newcomer to the world of mobile payments and has expertise in at least two of those three areas. So, when the opportunity arose to speak with Mark Stannard, Boku’s Chief Business Officer, 6GWorld™ leapt at the chance.

ETSI – MEC Security White Paper: Status of Standards Support & Future Evolutions

This White Paper, the very first initiative in this domain, aims to identify aspects of security where the nature of edge computing leaves typical industry approaches to cloud security insufficient.
Edge computing environments are characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment and both HW and SW devices. Given this overall level of system heterogeneity, security, trust and privacy are key topics for the edge environments.
In this heterogeneous scenario, end-to-end MEC security considers the impact on the elements coming from all stakeholders involved in the system. The paper provides an overview of ETSI MEC standards and current support for security, also complemented by a description of other relevant standards in the domain (e.g. ETSI TC CYBER, ETSI ISG NFV, 3GPP SA3) and cybersecurity regulation potentially applicable to edge computing. The White Paper concludes on a general perspective of future evolutions and standard directions on MEC security.

6G Security: What We Know & What Comes Next

Hard on the heels of an ABI Research report for 6GWorld, this on-demand webinar brings perspectives from ENISA, Trend Micro and ABI to explore where cybersecurity trends are leading us and how we can seize fresh opportunities.
https://www.6gworld.com/conceptualizing-security-in-a-6g-world-3/

Conceptualizing Security in a 6G World

The physical world of 2030 and beyond will be more networked, digitised and automated than ever before, depending on connectivity and AI to function. How do we make sure that bad actors cannot exploit this to endanger lives and economies?

Commissioned by 6GWorld, this ABI Research report maps out the interplay between security challenges and the evolution beyond 5G networks, including recommendations for action today and further reading.

Pin It on Pinterest