Urgent Communications is part of the InformaTech Division of Informa PLC
Informa PLC
|
ABOUT US
|
INVESTOR RELATIONS
|
TALENT
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Webinars
Podcasts
Commentary
Advertise
Newsletter Sign-Up
Newsletter Sign-Up
Network Tech
Related Topics
Broadband
Tower & Site
LMR
In-Building Wireless
Recent in
Network Tech
See All
thumbnail
Network Tech
Your phone's 5G connection Is vulnerable to bypass, DoS attacks
Your phone's 5G connection Is vulnerable to bypass, DoS attacks
by
Nate Nelson / Dark Reading
Jul 1, 2024
2 Min Read
Seven entities side with CERCI in opposition to latest PSSA 4.9 GHz proposal
Network Tech
Seven entities side with CERCI in opposition to latest PSSA 4.9 GHz proposal
Seven entities side with CERCI in opposition to latest PSSA 4.9 GHz proposal
by
Donny Jackson
May 23, 2024
5 Min Read
Devices & Solutions
Related Topics
Devices
Applications
Drones & Robots
IoT
Push to X
Satellite Direct to Device
Recent in
Devices & Solutions
See All
Tait Communications announces purchase of RFI Technology Solutions
Devices & Solutions
Tait Communications announces purchase of RFI Technology Solutions
Tait Communications announces purchase of RFI Technology Solutions
by
Donny Jackson
Feb 9, 2024
2 Min Read
The UK Post Office scandal holds lessons for telecom
Devices & Solutions
The UK Post Office scandal holds lessons for telecom
The UK Post Office scandal holds lessons for telecom
by
Iain Morris
Jan 14, 2024
3 Min Read
Operations
Related Topics
Critical Infrastructure
Enterprise
Public Safety
Government
Power
Recent in
Operations
See All
EchoStar execs downplay risk of bankruptcy
Operations
EchoStar execs downplay risk of bankruptcy
EchoStar execs downplay risk of bankruptcy
by
Jeff Baumgartner
Aug 14, 2024
2 Min Read
EchoStar sheds more subs as possible bankruptcy looms
Operations
EchoStar sheds more subs as possible bankruptcy looms
EchoStar sheds more subs as possible bankruptcy looms
by
Jeff Baumgartner
Aug 12, 2024
2 Min Read
Policy
Related Topics
Regulations
Legislation
Litigation
Funding
Recent in
Policy
See All
House GOP looks at transportation regulations in light of Chevron doctrine ruling
Policy
House GOP looks at transportation regulations in light of Chevron doctrine ruling
House GOP looks at transportation regulations in light of Chevron doctrine ruling
by
Dan Zukowski
Jul 30, 2024
1 Min Read
FCC’s Rosenworcel hopes 4.9 GHz proceeding will be finished within ‘several months’
Policy
FCC’s Rosenworcel hopes 4.9 GHz proceeding will be finished within ‘several months’
FCC’s Rosenworcel hopes 4.9 GHz proceeding will be finished within ‘several months’
by
Donny Jackson
Jul 11, 2024
4 Min Read
Call Center & Command
Related Topics
Incident Command
911
Tracking, Monitoring & Control
AI & Analytics
Dispatch/Call-Taking
Recent in
Call Center & Command
See All
thumbnail
Call Center & Command
Memphis residents oppose Musk's AI supercomputer over power concerns
Memphis residents oppose Musk's AI supercomputer over power concerns
by
Ben Wodecki / IoT World Today
Aug 4, 2024
2 Min Read
6G Summit brings unusual plea from carriers: Slow your roll
Call Center & Command
6G Summit brings unusual plea from carriers: Slow your roll
6G Summit brings unusual plea from carriers: Slow your roll
Nov 9, 2023
3 Min Read
System Design
Related Topics
Software
Coverage & Interference
Cybersecurity
Interoperability
Recent in
System Design
See All
FCC study pins all blame on AT&T for massive mobile outage
System Design
FCC study pins all blame on AT&T for massive mobile outage
FCC study pins all blame on AT&T for massive mobile outage
by
Jeff Baumgartner
Jul 24, 2024
2 Min Read
CISA’s Secure by Design Initiative at 1: A report card
System Design
CISA’s Secure by Design Initiative at 1: A report card
CISA’s Secure by Design Initiative at 1: A report card
by
Stephen de Vries
Jun 10, 2024
2 Min Read
IWCE
Home
System Design
Cybersecurity
Cybersecurity
Layoffs mount as cybersecurity vendors hunker down
Cybersecurity
Layoffs mount as cybersecurity vendors hunker down
Layoffs mount as cybersecurity vendors hunker down
by
Robert Lemos
Nov 2, 2022
|
1 Min Read
The cloud and 5G security apocalypse is only a matter of time
Cybersecurity
The cloud and 5G security apocalypse is only a matter of time
The cloud and 5G security apocalypse is only a matter of time
by
Iain Morris
Oct 21, 2022
1 Min Read
List of common passwords accounts for nearly all cyberattacks
Cybersecurity
List of common passwords accounts for nearly all cyberattacks
List of common passwords accounts for nearly all cyberattacks
by
Robert Lemos
Oct 21, 2022
1 Min Read
Sophisticated covert cyberattack campaign targets military contractors
Cybersecurity
Sophisticated covert cyberattack campaign targets military contractors
Sophisticated covert cyberattack campaign targets military contractors
by
Jai Vijayan
Sep 29, 2022
1 Min Read
Spell-checking in Google Chrome, Microsoft Edge browsers leaks passwords
Cybersecurity
Spell-checking in Google Chrome, Microsoft Edge browsers leaks passwords
Spell-checking in Google Chrome, Microsoft Edge browsers leaks passwords
by
Elizabeth Montalbano
Sep 22, 2022
1 Min Read
Why ports are at risk of cyberattacks
Cybersecurity
Why ports are at risk of cyberattacks
Why ports are at risk of cyberattacks
by
Aviv Grafi
Sep 12, 2022
1 Min Read
Cybersecurity
Thousands of organizations remain at risk from zero-click IP camera bug
Thousands of organizations remain at risk from zero-click IP camera bug
Aug 29, 2022
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Diffusing the connected car’s ticking data-privacy timebomb
Diffusing the connected car’s ticking data-privacy timebomb
Aug 14, 2022
|
1 Min Read
by
Graham Jarvis
Cybersecurity
10 malicious code packages slither into PyPI registry
10 malicious code packages slither into PyPI registry
Aug 9, 2022
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Big questions remain around massive Shanghai police data breach
Big questions remain around massive Shanghai police data breach
Aug 1, 2022
|
1 Min Read
by
Jai Vijayan
Cybersecurity
What firewalls can—and can’t—accomplish
What firewalls can—and can’t—accomplish
Jul 25, 2022
|
1 Min Read
by
Pat McGarry
Cybersecurity
New phishing attacks shame, scare victims into surrendering Twitter, Discord credentials
New phishing attacks shame, scare victims into surrendering Twitter, Discord credentials
Jul 11, 2022
|
1 Min Read
by
Nathan Eddy / Dark Reading
Cybersecurity
Chinese APT group likely using ransomware attacks as cover for IP theft
Chinese APT group likely using ransomware attacks as cover for IP theft
Jun 24, 2022
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Apple’s CarPlay update ‘threatens automaker data control’
Apple’s CarPlay update ‘threatens automaker data control’
Jun 16, 2022
|
1 Min Read
by
Paul Myles
Cybersecurity
Huawei’s big role in open source threatens new security backlash
Huawei’s big role in open source threatens new security backlash
Jun 10, 2022
|
1 Min Read
by
Iain Morris
Cybersecurity
Malicious Python Repository Package drops Cobalt Strike on Windows, macOS & Linux systems
Malicious Python Repository Package drops Cobalt Strike on Windows, macOS & Linux systems
May 24, 2022
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Security for microwave links
Security for microwave links
May 20, 2022
|
1 Min Read
Cybersecurity
Breaking down the Strengthening American Cybersecurity Act
Breaking down the Strengthening American Cybersecurity Act
May 12, 2022
|
1 Min Read
by
Charles Horton
Cybersecurity
China-backed Winnti APT siphons reams of U.S. trade secrets in sprawling cyber-espionage attack
China-backed Winnti APT siphons reams of U.S. trade secrets in sprawling cyber-espionage attack
May 6, 2022
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Vulnerabilities in Rockwell Automation PLCs could enable Stuxnet-like attacks
Vulnerabilities in Rockwell Automation PLCs could enable Stuxnet-like attacks
Apr 3, 2022
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Apple iPhone 14 may feature Chinese chips with military links
Apple iPhone 14 may feature Chinese chips with military links
Mar 31, 2022
|
1 Min Read
by
Iain Morris
Cybersecurity
Why cloud service providers are a single point of failure
Why cloud service providers are a single point of failure
Dec 9, 2021
|
1 Min Read
by
Marc Wilczek
Cybersecurity
USB devices the common denominator in all attacks on air-gapped systems
USB devices the common denominator in all attacks on air-gapped systems
Dec 6, 2021
|
1 Min Read
by
Jai Vijayan
Cybersecurity
What happens if time gets hacked?
What happens if time gets hacked?
Nov 15, 2021
|
1 Min Read
by
Kelly Jackson Higgins
Cybersecurity
Microsoft Azure Cosmos DB incident underscores the need to closely watch cloud data
Microsoft Azure Cosmos DB incident underscores the need to closely watch cloud data
Sep 1, 2021
|
1 Min Read
by
Robert Lemos
Cybersecurity
Microsoft Azure cloud vulnerability exposed thousands of databases
Microsoft Azure cloud vulnerability exposed thousands of databases
Aug 29, 2021
|
1 Min Read
by
Robert Lemos
Cybersecurity
5 key lessons from ICS attacks through the ages
5 key lessons from ICS attacks through the ages
Aug 6, 2021
|
1 Min Read
by
Corey Nachreiner
Cybersecurity
Newscan: Private Israeli spyware used to hack cellphones of journalists, activists worldwide
Newscan: Private Israeli spyware used to hack cellphones of journalists, activists worldwide
Jul 20, 2021
|
1 Min Read
by
Donny Jackson
Cybersecurity
4 integrated-circuit security threats and how to protect against them
4 integrated-circuit security threats and how to protect against them
Jul 14, 2021
|
1 Min Read
by
Matthew Areno
Cybersecurity
74% of Q1 malware was undetectable via signature-based tools
74% of Q1 malware was undetectable via signature-based tools
Jun 24, 2021
|
1 Min Read
by
Jai Vijayan
Cybersecurity
Microsoft patches 6 zero-day vulnerabilities under active attack
Microsoft patches 6 zero-day vulnerabilities under active attack
Jun 9, 2021
|
1 Min Read
by
Kelly Sheridan
Cybersecurity
Service-oriented architectures pitch for over-the-air (OTA) security
Service-oriented architectures pitch for over-the-air (OTA) security
Apr 29, 2021
|
1 Min Read
by
Susan Kuchinskas
Cybersecurity
Handcuffs over AI: Solving security challenges with law enforcement
Handcuffs over AI: Solving security challenges with law enforcement
Apr 8, 2021
|
1 Min Read
by
Charles Herring
Cybersecurity
UC-Berkeley survey shines light on cybersecurity concerns surrounding smart-city technologies
UC-Berkeley survey shines light on cybersecurity concerns surrounding smart-city technologies
Apr 5, 2021
|
1 Min Read
by
Donny Jackson
Cybersecurity
Newscan: Hackers breach 150,000 security cameras, exposing police, jails, schools, hospitals
Newscan: Hackers breach 150,000 security cameras, exposing police, jails, schools, hospitals
Mar 13, 2021
|
1 Min Read
by
Donny Jackson
Previous
1
2
3
4
5
6
Next
Recent
thumbnail
Regulations
Trump names Brendan Carr as next FCC chairman
Trump names Brendan Carr as next FCC chairman
by
Donny Jackson
Nov 19, 2024
4 Min Read
thumbnail
AI & Analytics
Google, NLC issue AI guide for city leaders
Google, NLC issue AI guide for city leaders
by
Ysabelle Kempe
Nov 17, 2024
1 Min Read
thumbnail
Tracking, Monitoring & Control
With new leadership, NextNav and Anterix boast of 900MHz momentum
With new leadership, NextNav and Anterix boast of 900MHz momentum
by
Mike Dano / Light Reading
Nov 17, 2024
2 Min Read
thumbnail
Public Safety
ZeroEyes earns key DHS designation, reducing legal liability for customers
ZeroEyes earns key DHS designation, reducing legal liability for customers
by
Donny Jackson
Nov 16, 2024
4 Min Read
Subscribe to receive Urgent Communications Newsletters
Catch up on the latest tech, media, and telecoms news from across the critical communications community
Sign Me Up