Urgent Communications is part of the InformaTech Division of Informa PLC
Informa PLC
|
ABOUT US
|
INVESTOR RELATIONS
|
TALENT
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Webinars
Podcasts
Commentary
Advertise
Newsletter Sign-Up
Newsletter Sign-Up
Network Tech
Related Topics
Broadband
Tower & Site
LMR
In-Building Wireless
Recent in
Network Tech
See All
thumbnail
Network Tech
Your phone's 5G connection Is vulnerable to bypass, DoS attacks
Your phone's 5G connection Is vulnerable to bypass, DoS attacks
by
Nate Nelson / Dark Reading
Jul 1, 2024
2 Min Read
Seven entities side with CERCI in opposition to latest PSSA 4.9 GHz proposal
Network Tech
Seven entities side with CERCI in opposition to latest PSSA 4.9 GHz proposal
Seven entities side with CERCI in opposition to latest PSSA 4.9 GHz proposal
by
Donny Jackson
May 23, 2024
5 Min Read
Devices & Solutions
Related Topics
Devices
Applications
Drones & Robots
IoT
Push to X
Satellite Direct to Device
Recent in
Devices & Solutions
See All
Tait Communications announces purchase of RFI Technology Solutions
Devices & Solutions
Tait Communications announces purchase of RFI Technology Solutions
Tait Communications announces purchase of RFI Technology Solutions
by
Donny Jackson
Feb 9, 2024
2 Min Read
The UK Post Office scandal holds lessons for telecom
Devices & Solutions
The UK Post Office scandal holds lessons for telecom
The UK Post Office scandal holds lessons for telecom
by
Iain Morris
Jan 14, 2024
3 Min Read
Operations
Related Topics
Critical Infrastructure
Enterprise
Public Safety
Government
Power
Recent in
Operations
See All
EchoStar execs downplay risk of bankruptcy
Operations
EchoStar execs downplay risk of bankruptcy
EchoStar execs downplay risk of bankruptcy
by
Jeff Baumgartner
Aug 14, 2024
2 Min Read
EchoStar sheds more subs as possible bankruptcy looms
Operations
EchoStar sheds more subs as possible bankruptcy looms
EchoStar sheds more subs as possible bankruptcy looms
by
Jeff Baumgartner
Aug 12, 2024
2 Min Read
Policy
Related Topics
Regulations
Legislation
Litigation
Funding
Recent in
Policy
See All
House GOP looks at transportation regulations in light of Chevron doctrine ruling
Policy
House GOP looks at transportation regulations in light of Chevron doctrine ruling
House GOP looks at transportation regulations in light of Chevron doctrine ruling
by
Dan Zukowski
Jul 30, 2024
1 Min Read
FCC’s Rosenworcel hopes 4.9 GHz proceeding will be finished within ‘several months’
Policy
FCC’s Rosenworcel hopes 4.9 GHz proceeding will be finished within ‘several months’
FCC’s Rosenworcel hopes 4.9 GHz proceeding will be finished within ‘several months’
by
Donny Jackson
Jul 11, 2024
4 Min Read
Call Center & Command
Related Topics
Incident Command
911
Tracking, Monitoring & Control
AI & Analytics
Dispatch/Call-Taking
Recent in
Call Center & Command
See All
thumbnail
Call Center & Command
Memphis residents oppose Musk's AI supercomputer over power concerns
Memphis residents oppose Musk's AI supercomputer over power concerns
by
Ben Wodecki / IoT World Today
Aug 4, 2024
2 Min Read
6G Summit brings unusual plea from carriers: Slow your roll
Call Center & Command
6G Summit brings unusual plea from carriers: Slow your roll
6G Summit brings unusual plea from carriers: Slow your roll
Nov 9, 2023
3 Min Read
System Design
Related Topics
Software
Coverage & Interference
Cybersecurity
Interoperability
Recent in
System Design
See All
FCC study pins all blame on AT&T for massive mobile outage
System Design
FCC study pins all blame on AT&T for massive mobile outage
FCC study pins all blame on AT&T for massive mobile outage
by
Jeff Baumgartner
Jul 24, 2024
2 Min Read
CISA’s Secure by Design Initiative at 1: A report card
System Design
CISA’s Secure by Design Initiative at 1: A report card
CISA’s Secure by Design Initiative at 1: A report card
by
Stephen de Vries
Jun 10, 2024
2 Min Read
IWCE
Home
System Design
Cybersecurity
Cybersecurity
CJIS raises a high bar for cybersecurity in law enforcement
Cybersecurity
CJIS raises a high bar for cybersecurity in law enforcement
CJIS raises a high bar for cybersecurity in law enforcement
by
Mike Eppes
Jun 26, 2023
|
1 Min Read
2 more Apple zero-days exploited in ongoing iOS spy campaign
Cybersecurity
2 more Apple zero-days exploited in ongoing iOS spy campaign
2 more Apple zero-days exploited in ongoing iOS spy campaign
by
Jai Vijayan
Jun 22, 2023
1 Min Read
Killnet threatens imminent SWIFT, world banking attacks
Cybersecurity
Killnet threatens imminent SWIFT, world banking attacks
Killnet threatens imminent SWIFT, world banking attacks
by
Tara Seals
Jun 19, 2023
1 Min Read
One month after ransomware attack, Dallas reports 90% of its network has been restored
Cybersecurity
One month after ransomware attack, Dallas reports 90% of its network has been restored
One month after ransomware attack, Dallas reports 90% of its network has been restored
by
Andy Castillo
Jun 14, 2023
1 Min Read
Cl0P gang sat on exploit for MOVEit flaw for nearly two years
Cybersecurity
Cl0P gang sat on exploit for MOVEit flaw for nearly two years
Cl0P gang sat on exploit for MOVEit flaw for nearly two years
by
Jai Vijayan
Jun 12, 2023
1 Min Read
Why antivirus cannot protect your car
Cybersecurity
Why antivirus cannot protect your car
Why antivirus cannot protect your car
by
Roma Nazarov / TU-Automotive
Jun 6, 2023
1 Min Read
Cybersecurity
Russia’s war in Ukraine shows cyberattacks can be war crimes
Russia’s war in Ukraine shows cyberattacks can be war crimes
May 27, 2023
|
1 Min Read
by
Andrada Fiscutean
Cybersecurity
Flood of ransom payments continues as officials mull ban
Flood of ransom payments continues as officials mull ban
May 23, 2023
|
1 Min Read
by
Matt Kapko
Cybersecurity
3 common initial attack vectors account for most ransomware campaigns
3 common initial attack vectors account for most ransomware campaigns
May 22, 2023
|
1 Min Read
by
Robert Lemos
Cybersecurity
FBI & FCC warn on ‘juice jacking’ at public chargers, but what’s the risk?
FBI & FCC warn on ‘juice jacking’ at public chargers, but what’s the risk?
May 12, 2023
|
1 Min Read
by
Nate Nelson / Dark Reading
Cybersecurity
Government, industry efforts to thwart ransomware slowly start to pay off
Government, industry efforts to thwart ransomware slowly start to pay off
May 9, 2023
|
1 Min Read
by
Nate Nelson / Dark Reading
Cybersecurity
DNA-sequencing equipment vulnerability adds new twist to medical-device cyberthreats
DNA-sequencing equipment vulnerability adds new twist to medical-device cyberthreats
May 4, 2023
|
1 Min Read
by
Donny Jackson
Cybersecurity
Metaverse version of the Dark Web could be nearly impenetrable
Metaverse version of the Dark Web could be nearly impenetrable
Apr 27, 2023
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Global spyware attacks spotted against both new and old iPhones
Global spyware attacks spotted against both new and old iPhones
Apr 19, 2023
|
1 Min Read
by
Elizabeth Montalbano
Cybersecurity
Cybercriminals ‘CAN’ steal your car, using novel IoT hack
Cybercriminals ‘CAN’ steal your car, using novel IoT hack
Apr 10, 2023
|
1 Min Read
by
Nate Nelson / Dark Reading
Cybersecurity
FBI seizes Genesis cybercriminal marketplace in ‘Operation Cookie Monster’
FBI seizes Genesis cybercriminal marketplace in ‘Operation Cookie Monster’
Apr 7, 2023
|
1 Min Read
by
Elizabeth Montalbano
Cybersecurity
Hey, Siri: Hackers can control smart devices using inaudible sounds
Hey, Siri: Hackers can control smart devices using inaudible sounds
Apr 4, 2023
|
1 Min Read
by
Robert Lemos
Cybersecurity
Tesla Model 3 hacked in less than 2 minutes at Pwn2Own contest
Tesla Model 3 hacked in less than 2 minutes at Pwn2Own contest
Mar 26, 2023
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Microsoft Outlook vulnerability could be 2023's 'It' bug
Microsoft Outlook vulnerability could be 2023's 'It' bug
Mar 20, 2023
|
1 Min Read
by
Nathan Eddy / Dark Reading
Cybersecurity
Impact of quantum technologies on the telecommunications industry
Impact of quantum technologies on the telecommunications industry
Mar 14, 2023
|
1 Min Read
by
Kelly Richdale
Cybersecurity
Verizon, AT&T, T-Mobile, and Dish have all been targets of hacks this year
Verizon, AT&T, T-Mobile, and Dish have all been targets of hacks this year
Mar 12, 2023
|
1 Min Read
by
Mike Dano
Cybersecurity
Biden’s cybersecurity strategy calls for software liability, tighter critical-infrastructure security
Biden’s cybersecurity strategy calls for software liability, tighter critical-infrastructure security
Mar 6, 2023
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Command-injection bug in Cisco industrial gear opens devices to complete takeover
Command-injection bug in Cisco industrial gear opens devices to complete takeover
Feb 8, 2023
|
1 Min Read
by
Nate Nelson / Dark Reading
Cybersecurity
Ransomware profits decline as victims dig in, refuse to pay
Ransomware profits decline as victims dig in, refuse to pay
Jan 24, 2023
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Newscan: Police software vendor breach exposes personal data, raid plans
Newscan: Police software vendor breach exposes personal data, raid plans
Jan 24, 2023
|
1 Min Read
by
Donny Jackson
Cybersecurity
T-Mobile failed to secure API in latest hack
T-Mobile failed to secure API in latest hack
Jan 23, 2023
|
1 Min Read
by
Mike Dano
Cybersecurity
Critical manufacturing sector in the cyberattacking bullseye
Critical manufacturing sector in the cyberattacking bullseye
Jan 23, 2023
|
1 Min Read
by
Nathan Eddy / Dark Reading
Cybersecurity
A billion dollars for local-government cybersecurity—Will they ever see it?
A billion dollars for local-government cybersecurity—Will they ever see it?
Jan 18, 2023
|
1 Min Read
by
Dr. Alan R. Shark
Cybersecurity
Norton LifeLock warns on Password Manager account compromises
Norton LifeLock warns on Password Manager account compromises
Jan 18, 2023
|
1 Min Read
by
Tara Seals
Cybersecurity
Better phishing, easy malicious implants: How AI could change cyberattacks
Better phishing, easy malicious implants: How AI could change cyberattacks
Jan 13, 2023
|
1 Min Read
by
Robert Lemos
Cybersecurity
Uber breached again after attackers compromise third-party cloud
Uber breached again after attackers compromise third-party cloud
Jan 3, 2023
|
1 Min Read
by
Elizabeth Montalbano
Cybersecurity
Security’s latest tools: New browsers, ‘posture’ management, virtual assistants
Security’s latest tools: New browsers, ‘posture’ management, virtual assistants
Dec 23, 2022
|
1 Min Read
by
Paul Shomo
Cybersecurity
3 ways attackers bypass cloud security
3 ways attackers bypass cloud security
Dec 13, 2022
|
1 Min Read
by
Kelly Jackson Higgins
Cybersecurity
Killnet gloats about DDoS attacks downing Starlink, White House
Killnet gloats about DDoS attacks downing Starlink, White House
Nov 29, 2022
|
1 Min Read
Cybersecurity
SolarWinds faces potential SEC enforcement action over Orion breach
SolarWinds faces potential SEC enforcement action over Orion breach
Nov 8, 2022
|
1 Min Read
by
Jai Vijayan
Previous
1
2
3
4
5
6
Next
Recent
thumbnail
Regulations
Trump names Brendan Carr as next FCC chairman
Trump names Brendan Carr as next FCC chairman
by
Donny Jackson
Nov 19, 2024
4 Min Read
thumbnail
AI & Analytics
Google, NLC issue AI guide for city leaders
Google, NLC issue AI guide for city leaders
by
Ysabelle Kempe
Nov 17, 2024
1 Min Read
thumbnail
Tracking, Monitoring & Control
With new leadership, NextNav and Anterix boast of 900MHz momentum
With new leadership, NextNav and Anterix boast of 900MHz momentum
by
Mike Dano / Light Reading
Nov 17, 2024
2 Min Read
thumbnail
Public Safety
ZeroEyes earns key DHS designation, reducing legal liability for customers
ZeroEyes earns key DHS designation, reducing legal liability for customers
by
Donny Jackson
Nov 16, 2024
4 Min Read
Subscribe to receive Urgent Communications Newsletters
Catch up on the latest tech, media, and telecoms news from across the critical communications community
Sign Me Up