Confidence in the telecommunications sector may increase

| |

Future telecommunications networks will require a whole new approach to (cyber) security through new types of business applications in the future, fueled by the proliferation of 5G networks, according to Ericsson, which held in mid-May. CountingNews also participated in its webinar on cyber security challenges. Although the consumer aspects of the introduction of 5G networks are still mostly heard today, it is clear that the perpetrators of cyber attacks over these networks will not be interested in contacts or private photos stored on 5G phones.

UNEXPECTABLE DAMAGE [19659] The Swedish multi, which is appearing in Hungary at the same time as the change of regime, has delivered 2G, 3G, 4G or just 5G network infrastructure elements globally to hundreds of operators in recent decades, but while 3G and 4G are basically only mobile broadband 5G is expected to be a network infrastructure that paves the way for new products and services for all sections of society, the company said.

health, smart grids, the plants of the future, the media and entertainment industry or even mobility, which in this case covers the automation of vehicles used for Although the Swedish company also sees that Asia and North America are somewhat protracted in terms of building 5G networks in addition to Europe, the introduction of 5G commercial services has so far been possible with a total investment of € 1 billion, partly from EU funding.

Docler is looking for a hundred new developers with a salary of up to 2.5 million (x)

            Docler Holding is looking for the best Hungarian developers in the IT sector with outstanding salaries – not only in domestic offices.

Docler seeks 100 new developers with up to 2.5 million salary (x)
        Docler Holding is looking for the best Hungarian developers in the IT sector with outstanding salaries – not only in domestic offices.

A frightening parallel to the scale of the damage caused by cyber-attacks: According to a study by PwC for the European Commission, the damage caused by internet thefts to obtain trade secrets was estimated at € 60 billion by 2018 and some 290,000 jobs are projected to be lost by 2025. and 1 million jobs could be lost due to cybercrime damage. Furthermore, the study points out that not only is Europe spending less on cybersecurity, but it is three times slower than the world average to respond to cyber attacks.

While these attacks have so far typically been carried out by hacking IT systems at targets, telecommunications infrastructure has only transfer has played a role in all this, until then, the telecommunications networks of the future will be able to become targets themselves, paving the way for cybercriminals to obtain business and national security secrets, or even extensive sabotage. Action against this phenomenon is now being advocated not only by the notoriously paranoid United States, but also by the European Union recognizing that certain preventive measures should at least seek to reduce the risks.


Such a preventive step has been put forward by the Commission. a toolbox backed by a risk assessment study, which already makes concrete, albeit non-binding, proposals (including updating the regulatory environment, diversifying with suppliers, strengthening operators' lines of defense and identifying high-risk suppliers) to minimize risk.

At the same time, the EU toolbox's fundamentally good professional reasoning system is in many cases undermined by economic policy conflicts of interest. U.S. protectionism may seem to be driving water to the mills of European network equipment suppliers, but China is just as defending its own markets even if it happens to win a European technology supplier in a Chinese mobile tender (non-Chinese suppliers have extremely limited room for maneuver, as in a recent government tender). result also indicates).

In connection with the construction of new generation networks and the outcome of tenders, perhaps the most important question is whether it will be possible to talk about secure and less secure mobile operators in the future, depending on which supplier the operator has broken down with.


Thus, for example, with 5G, a mobile operator can easily build a private network for a larger partner, the elements of which can be defined by the customer. While in the past this role was largely limited to the fact that a company or government agency could choose what type of equipment to buy for its employees, at 5G it is theoretically possible to meet the communication needs of an organization with the tools of a particular supplier.

A good example of this and a trust-based collaboration is a private network ordered by Mercedes-Benz, a customer of the German telephone subsidiary Telefonica, which Ericsson can build, regardless of whether another company has a local interest in the Spanish telecommunications multi. builds the national network. To a certain extent, security can be further enhanced if the mobile operator is left out of the entire infrastructure as it is and a company operates a private network on its own frequency, as has been allowed by the German regulatory authority. At Ericsson, however, this approach is not necessarily preferred, the shoemaker should remain at the forefront.

Such private networks operating on their own frequency will probably not be built in Hungary anyway, not only due to the size of the (large) industrial players in the country. . At the beginning of the 5G era, however, the balance of power is slowly beginning to develop, as it seems increasingly clear that the two current 5G providers, Vodafone Hungary and Magyar Telekom, will remain their existing suppliers (the former choosing Huawei and the latter choosing Ericsson for 5G). as a partner in a commercial network). The cucumber egg has been working with ZTE so far. fourth, it could be state-owned Telenor, which, according to our information, may choose a supplier at group level, depending on the decision of the PPF group, so the position of the Chinese is not set in stone at all.


It finally automatically syncs your add-ons with the Edge browser

Chinese rivals are breaking into the laurels of Zoom