www.sesei.eu | dinesh.chand.sharma@sesei.eu | M: +919810079461 | Tel: +911133521500
5G

European Commission adopts Implementing Regulation to pave the way for high capacity 5G network infrastructure

The European Commission (EC) has adopted the Implementing Regulation on small-area wireless access points, or small antennas, which are crucial for the timely deployment of 5G networks that are delivering high-capacity and increased coverage as well as advanced connection speeds. The Regulation specifies the physical and technical characteristics of small cells for 5G networks. It aims to help simplify and accelerate 5G network installations, which should be facilitated through a permit-exempt deployment regime, while ensuring that national authorities keep oversight.

5G will transform our economy and society. The "fifth generation" of wireless technology will deliver high capacity, high-speed and low-latency (quick network response) services across vital sectors.

 
TAGS #ICT #5G
Security

Trust in new technologies: CEN and CENELEC published a new series of European standards on cybersecurity

In a world increasingly relying on digital technologies and data to function, opportunities go hand in hand with potential risks. For this reason, cybersecurity is at the centre of international efforts, both public and private, to minimise dangers for critical infrastructure and personal data, thus ensuring that the highest number possible of individuals and companies, in all sectors, can benefit from new technologies.

In this context, the standardization community is playing an important role: standards for cybersecurity and data protection are currently being developed both internationally and at the European level to address the risks posed by cyber-attacks and help ensure high levels of protection. As part of this effort, CEN and CENELEC’s JTC 13 ‘Cybersecurity and Data Protection’ just released a series of European Standards (ENs).

The new standards provide a series of guidelines and criteria to assess the security level of IT systems, cryptographic modules and privacy.