Top related persons:
Top related locs:
Top related orgs:

Search resuls for: "Surrey Centre"


2 mentions found


AdvertisementIn Russia, however, "they have the expertise but not necessarily the service providers who sit in front of organisations to detect and deflect DDoS attacks," Woodward added. AdvertisementSuch attacks may also help "support defensive movements of the Ukrainian army," said Vasileios Karagiannopoulos, an associate professor in cybercrime and cybersecurity at the University of Portsmouth. Advertisement"The IT Army is managed by the SBU and the Ukrainian MoD," Soesanto said, adding that they receive support from Ukraine's Ministry of Digital Transformation. Ted told BI that "the MoD does not run the IT army, but there is collaboration to ensure efforts are synchronized." Ukraine's Ministry of Defense did not respond to a request for comment from BI on the nature of its relationship with the IT army.
Persons: , Mykhailo Fedorov, Ukraine's, Eager, Ted, Ted said, Alan Woodward, Woodward, Ukraine's cyberdefense, Stefan Soesanto, Vasileios Karagiannopoulos, Karagiannopoulos, Soesanto Organizations: Service, Business, Transformation Ministry, IT Army, Surrey Centre, Cyber Security, University of Surrey, Visa, Mastercard, Center for Security Studies, ETH Zurich, Kommersant, University of Portsmouth, country's Ministry of Defense, Ukrainian MoD, Ukraine's Ministry of Digital, MoD, Ukraine's Ministry of Defense Locations: Russia, Ukraine, Ukraine's, cybercrime, Ukrainian
Two experts in 5G technology and cybersecurity, Rahim Tafazolli and Alan Woodward of the University of Surrey, spoke to Insider about the key steps organizations should take to develop a secure 5G network. Understand your needs and hire the right staffThe first thing to check is whether you need a 5G network, and if so, how you should scope it. Evaluate public versus private 5G optionsIf you don't have the full complement of telecom skills required, it's much safer to rely on those who do to provide you with a secure 5G network. A public 5G network slice from a mobile operator may, in that instance, be better than a private, on-premise 5G network that you have to maintain in-house. Implement monitoring and automationOperating a 5G network requires extensive telecom expertise that many enterprises lack.
Persons: , Rahim Tafazolli, Alan Woodward, Tafazolli, 5GIC, Woodward Organizations: Service, University of Surrey, Institute for Communication Systems, Surrey Centre, Cyber Security
Total: 2