YOU ARE AT:Security

BROWSING: Security

The value of privileged access to your security budget (Reader Forum)

For many organizations, cybersecurity continues to be a growing concern. As data breaches become increasingly frequent, companies are starting to find more room in their budgets for security-focused initiatives. Privileged Access Management (PAM) is a crucial part of any cybersecurity strategy that governs authorized...

Well, technically… telco fraud is an international matter: BICS’ Katia Gonzalez (Ep. 98)

BICS' Head of Fraud Prevention and Security Katia Gonzalez provides an update on STIR/SHAKEN and argues that while the FCC's initiative has made a dent in the robocalls being experienced by many Americans, spam, fraud and other related telco issues must be considered on...

Ericsson provides security platform for Malaysia’s 5G network

Ericsson is providing the network equipment for the deployment of DNB's 5G network across Malaysia Swedish vendor Ericsson has deployed its Ericsson Security Manager (ESM) to improve the security of Malaysia’s Digital Nasional Berhad (DNB) 5G network. DNB is the state agency in charge of the...

Cox Communications deploys private network in downtown Las Vegas

The network covers eight city blocks in Las Vegas’ Fremont Street area Cox Communications has deployed a private wireless network in Las Vegas’ Fremont Street area. The network covers eight city blocks and supports safety and security applications like video cameras and real-time data analytics, but according...

How secure are private 4G/5G wireless networks? (Reader Forum)

As enterprises embrace private wireless technology to improve the reliability demanded by new Industry 4.0 use cases, cyber security remains a predominant concern among both technical and non-technical leaders. That concern continues to intensify as organizations are hammered with the challenges of ransomware, insecure IoT...

The changing DDoS landscape—Should data centers be concerned?

DDoS attacks targeting commercial data centers are becoming more frequent, bigger and smarter Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. While...

Siemens selects Verizon for Zero Trust capabilities

Siemens said the Verizon solution is designed to meet the requirements of its Zero Trust ideology of 'never trust, but always verify' Verizon Business this week announced that it is providing Siemens with Zero Trust network capabilities. The deployment will take place at the company’s...

ChatGPT and cybersecurity: Data breaches, system vulnerabilities and malicious use (Reader Forum)

When ChatGPT first became available in the fall of 2022, most people were in awe of the advances generative AI technology had made, as well as inspired by its promise of increased efficiency and productivity — especially for businesses. However, such technologies also involve...

Using cloud-based IoT to boost school safety (Reader Forum)

The safety and security of students and faculty members must always rank as a top concern for educational organizations, but with national school enrollment numbers steadily increasing, security teams are frequently turning towards intelligent technology to best protect both people and property. Schools and educational...

Editorial Report: Fighting the newest breed of DDoS attacks on data centers

Over the last few years, the threat posed by Distribute Denial of Service (DDoS) attacks has increased at an alarming pace. The frequency, magnitude and sophistication of DDoS attacks has grown as botnets and automated attack tools are readily available to cyber criminals. Today,...

New cybersecurity strategy must stress accountability (Reader Forum)

Rampant malicious activity in cyberspace hurts individuals, companies, and government agencies, while threatening US national security. The expected release of a new National Cybersecurity Strategy by the Biden Administration is an occasion for us to learn lessons from past efforts to reduce cyber risk,...

Singtel unveils 5G security-as-a-slice offering in Singapore

Singtel said the new capability identifies and blocks cyber threats at the network level thus preventing them from reaching the network’s users Singapore telecommunications operator Singtel unveiled its new 5G security-as-a-slice (SecaaS) offering, the telco said in a release. The new capability identifies and blocks cyber...

What is a protocol DDoS attack?

Protocol DDoS attack success is measured not by their size but rather their frequency and persistence Distributed denial-of-service (DDoS) attacks temporarily or indefinitely disrupt services of a host connected to a network to render an entire network or website unavailable. There are three attacks in this...

Application layer DDoS attacks: What is a DNS flood?

The DNS layer is considered the 'phonebook' of the internet During an application or Layer 7 distributed denial-of-service (DDoS) attack, a bad actor or actors exploit weaknesses in the layer of a website that interfaces between human input and the site’s technical backend. In Layer...

Application layer DDoS attacks: What is an HTTP(S) flood?

HTTP flood is the most common type of application layer DDoS attacks Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. There are...

DDoS trends: What are multi-vector attacks?

Comcast Business says it mitigated 24,845 multi-vector DDoS attacks in 2021 Distributed denial-of-service (DDoS) DDoS attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. While larger-scale...

DDoS trends: Volumetric attacks are on the rise

AT&T: 'Volumetric attacks could hit new peaks' Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. DDoS attacks typically target edge network devices...

ZTE’s 5G NR kit gets security certification in Germany

ZTE said its 5G new radio (NR) gNodeB product has complied with the security requirements of Germany Chinese vendor ZTE said its 5G New Radio (NR) gNodeB product has been approved under Germany’s Federal Office for Information Security (BSI)’s NESAS (network equipment security assurance scheme)...

Chinese balloon equipped to collect communications information: State Department

The high-altitude Chinese balloon that traveled over the United States in the past week was equipped to "collect and geolocate" communications signals, according to the U.S. Department of State and published reports. Chinese officials have claimed that the balloon was a "civilian airship" used for...

Cisco closes IT/OT divide with new cloud tools for remote IoT management, security

Cisco has introduced a number of new cloud services in its IoT operations dashboard to increase industrial asset visibility and manage assets remotely and securely. At its annual Cisco Live event in Amsterdam, the firm said it had focused on ways to bridge the...

The role of wireless technology and installation for network security (Reader Forum)

Wireless technology has revolutionized the way businesses operate, connecting employees and devices seamlessly. However, with the increasing use of wireless technology comes the need for proper installation and maintenance to ensure network security. Whether you're a business owner or a corporate IT professional, understanding...

AT&T on 2023: Getting serious about cybersecurity at the edge

Cybersecurity continues its evolution and organizations are focused on it more holistically, as part of business outcomes rather than as component parts, according to Theresa Lanowitz of AT&T. Lanowitz, who is the head of evangelism for AT&T Business' cybersecurity segment, draws on insights gathered...

NVIDIA eBook: The AI-Powered Telco

Leaders in every industry are turning to AI to transform their businesses. For the Telecommunications industry, AI delivers value through the terabytes of data collected every day—from network elements to customer interactions—and through the resulting insights related to managing increased network demand, combating cyberthreats, optimizing...

T-Mobile: API was used to access customer account information

T-Mobile US has suffered another data breach, with the company disclosing that a single Application Programming Interface (API) was used to "obtain limited types of information" on some of its customers. T-Mo said it was in the process of informing those customers, and that...