{"id":11836,"date":"2023-05-18T12:11:18","date_gmt":"2023-05-18T10:11:18","guid":{"rendered":"https:\/\/fuenf-g.de\/cybersecurity\/"},"modified":"2023-06-09T13:53:36","modified_gmt":"2023-06-09T11:53:36","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/fuenf-g.de\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1289.6px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h1>With cybersecurity to the smart factory<\/h1>\n<\/div><div class=\"fusion-text fusion-text-2\"><p>Cybersecurity is of paramount importance in the context of 5G. The advanced technology and increased connectivity bring about new security risks. Given the massive data traffic and expanded attack surface, robust security measures must be implemented to protect sensitive information and defend networks against threats.<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><h2 class=\"fusion-responsive-typography-calculated\" data-fontsize=\"22\" data-lineheight=\"28.38px\">All articles about Cybersecurity at a glance:<\/h2>\n<\/div><div class=\"fusion-separator\" style=\"align-self: flex-start;margin-right:auto;margin-bottom:43px;width:100%;max-width:300px;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;--awb-sep-color:#e53537;border-color:#e53537;border-top-width:2px;\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1289.6px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-blog-shortcode fusion-blog-shortcode-1 fusion-blog-archive fusion-blog-layout-medium fusion-blog-no\"><div class=\"fusion-posts-container fusion-posts-container-no fusion-no-meta-info\" data-pages=\"0\"><article id=\"blog-1-post-10795\" class=\"fusion-post-medium post-10795 post type-post status-publish format-standard has-post-thumbnail hentry category-bannerintegration category-redaktion-en tag-5g-applications tag-6g-en-2 tag-cybersecurity-en tag-european-commission tag-iot-solutions-en tag-research-en tag-sns-ju-en\">\n\t<style type=\"text\/css\">\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\t<\/style>\n\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper fusion-image-size-fixed\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/fuenf-g.de\/en\/2023\/01\/26\/europe-ramps-up-6g-research-investment-worth-e250-million\/\" aria-label=\"Europe ramps up 6G research investment, worth \u20ac250 million\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"202\" src=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2023\/01\/banner-gf88deec8f_1920-320x202.jpg\" class=\"attachment-blog-medium size-blog-medium wp-post-image\" alt=\"Europe scales up 6G research investments and selects 35 new projects worth \u20ac250 million\" srcset=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2023\/01\/banner-gf88deec8f_1920-320x202.jpg 320w, https:\/\/fuenf-g.de\/wp-content\/uploads\/2023\/01\/banner-gf88deec8f_1920-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/fuenf-g.de\/en\/2023\/01\/26\/europe-ramps-up-6g-research-investment-worth-e250-million\/\">Europe ramps up 6G research investment, worth \u20ac250 million<\/a><\/h2><div class=\"fusion-post-content-container\"><p>  Europe scales up 6G research investments and selects 35 new projects worth \u20ac250 million (Image: Pixabay)    The Smart Networks and Services Joint Undertaking (SNS JU) selected its first portfolio of<\/p><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/article>\n<article id=\"blog-1-post-10464\" class=\"fusion-post-medium post-10464 post type-post status-publish format-standard has-post-thumbnail hentry category-bannerintegration category-harry-jacob-en tag-5g-router-en-2 tag-5g-routers tag-atop-en tag-cybersecurity-en tag-industrial-router tag-router-en-2 tag-taics-en\">\n\t<style type=\"text\/css\">\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\t<\/style>\n\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper fusion-image-size-fixed\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/fuenf-g.de\/en\/2022\/10\/25\/atop-router-receives-cybersecurity-certification\/\" aria-label=\"Atop router receives cybersecurity certification\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"202\" src=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/10\/Atop_CWR5805-320x202.jpg\" class=\"attachment-blog-medium size-blog-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/10\/Atop_CWR5805-320x202.jpg 320w, https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/10\/Atop_CWR5805-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/fuenf-g.de\/en\/2022\/10\/25\/atop-router-receives-cybersecurity-certification\/\">Atop router receives cybersecurity certification<\/a><\/h2><div class=\"fusion-post-content-container\"><p>Securing production networks is a fundamental challenge for industrial companies. This is especially true for wireless networks, such as 5G campus networks. At the automation trade fair SPS in Nuremberg, Atop presents its secure 5G router CWR 5805 \u2013 the first ever with the IoT cybersecurity certification TAICS Level 2.<\/p><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/article>\n<article id=\"blog-1-post-9112\" class=\"fusion-post-medium post-9112 post type-post status-publish format-standard has-post-thumbnail hentry category-bannerintegration category-redaktion-en tag-bug-bounty-program tag-cybersecurity-en tag-security-vulnerabilities-of-5g tag-yeswehack-en tag-zte-corporation\">\n\t<style type=\"text\/css\">\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\t<\/style>\n\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper fusion-image-size-fixed\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/fuenf-g.de\/en\/2022\/03\/10\/zte-corporation-launches-public-bug-bounty-program\/\" aria-label=\"ZTE Corporation launches public bug bounty program\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"202\" src=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/02\/security-gdb347a59c_1920-320x202.jpg\" class=\"attachment-blog-medium size-blog-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/02\/security-gdb347a59c_1920-200x125.jpg 200w, https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/02\/security-gdb347a59c_1920-300x188.jpg 300w, https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/02\/security-gdb347a59c_1920-320x202.jpg 320w, https:\/\/fuenf-g.de\/wp-content\/uploads\/2022\/02\/security-gdb347a59c_1920-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/fuenf-g.de\/en\/2022\/03\/10\/zte-corporation-launches-public-bug-bounty-program\/\">ZTE Corporation launches public bug bounty program<\/a><\/h2><div class=\"fusion-post-content-container\"><p> A bug bounty program aims to provide greater cybersecurity in a world connected by 5G (Image: Pixabay)     Many companies are currently digitizing their production, resulting in exponential growth of networked<\/p><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/article>\n<article id=\"blog-1-post-6292\" class=\"fusion-post-medium post-6292 post type-post status-publish format-standard has-post-thumbnail hentry category-redaktion-en tag-crada tag-cybersecurity-en tag-nccoe tag-nist tag-nokia-en\">\n\t<style type=\"text\/css\">\n\t\t\n\t\t\n\t\t\n\t\t\n\t\t\t<\/style>\n\n\n\t\t\t<div class=\"fusion-flexslider flexslider fusion-flexslider-loading fusion-post-slideshow\" style=\"\">\n\t\t<ul class=\"slides\">\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><div  class=\"fusion-image-wrapper fusion-image-size-fixed\" aria-haspopup=\"true\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/fuenf-g.de\/en\/2021\/02\/09\/nokia-selected-for-u-s-federal-5g-cybersecurity-project\/\" aria-label=\"Nokia selected for U.S. Federal 5G Cybersecurity Project\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"320\" height=\"202\" src=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2021\/02\/nokia_oulu_telia_5gdemo_image_2-320x202.jpg\" class=\"attachment-blog-medium size-blog-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/fuenf-g.de\/wp-content\/uploads\/2021\/02\/nokia_oulu_telia_5gdemo_image_2-320x202.jpg 320w, https:\/\/fuenf-g.de\/wp-content\/uploads\/2021\/02\/nokia_oulu_telia_5gdemo_image_2-700x441.jpg 700w\" sizes=\"(max-width: 320px) 100vw, 320px\" \/>\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/div>\n<\/li>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t<\/div>\n\t<div class=\"fusion-post-content post-content\"><h2 class=\"blog-shortcode-post-title entry-title\"><a href=\"https:\/\/fuenf-g.de\/en\/2021\/02\/09\/nokia-selected-for-u-s-federal-5g-cybersecurity-project\/\">Nokia selected for U.S. Federal 5G Cybersecurity Project<\/a><\/h2><div class=\"fusion-post-content-container\"><p> Industry 4.0 use case over 5G at Nokia Oulu factory.\u00a0(Picture: Nokia)     Nokia has been selected as a technology provider and collaborator by the National Cybersecurity Center of Excellence (NCCoE) 5G<\/p><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/article>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":15,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":{"facebook_5053329184679405_398544750902733":""},"rop_publish_now_history":[],"rop_publish_now_status":"pending","_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":"","_FSMCFIC_featured_image_hide":"","footnotes":""},"class_list":["post-11836","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/pages\/11836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/comments?post=11836"}],"version-history":[{"count":1,"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/pages\/11836\/revisions"}],"predecessor-version":[{"id":11841,"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/pages\/11836\/revisions\/11841"}],"wp:attachment":[{"href":"https:\/\/fuenf-g.de\/en\/wp-json\/wp\/v2\/media?parent=11836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}