New FCC effort seeks alignment with NIST principles on cybersecurity
The Biden administration and the Federal Communications Commission are working on a product labeling effort focused on standards for cybersecurity in consumer and IoT products. A new "U.S. Cyber Trust Mark" program has been proposed...
For many organizations, cybersecurity continues to be a growing concern. As data breaches become increasingly frequent, companies are starting to find more room in their budgets for security-focused initiatives. Privileged Access Management (PAM) is a crucial part of any cybersecurity strategy that governs authorized...
Botnet traffic forcing a distributed denial of service (DDoS) on IoT networks, originating from insecure IoT devices, increased five-fold over the past year. This is the key finding from a new report on IoT cybersecurity vulnerabilities by Finnish vendor Nokia, plus others.
The report,...
Verizon's annual report on data breaches says cost & frequency of ransomware attacks has been rising
The costs of ransomware attacks are on the rise, with the median cost per incident having more than doubled over the past two years, according to Verizon's annual Data...
Company says no customer databases breached during cybersecurity incident in February, but employee data was extracted
Dish Network continues to lose wireless customers, seeing 81,000 subscribers leave the service during the first quarter of the year as well as a loss of 552,000 pay-TV subscribers....
When ChatGPT first became available in the fall of 2022, most people were in awe of the advances generative AI technology had made, as well as inspired by its promise of increased efficiency and productivity — especially for businesses. However, such technologies also involve...
International test house DEKRA has acquired Taiwan-based Onward Security as part of its goal to expand its portfolio in cybersecurity product testing and certification.
Onward Security focuses on cybersecurity compliance solutions for companies in IoT and industrial IoT device manufacturing, as well as automotive, industrial...
Network design and services firm Betacom has developed a perimeter surveillance solution to run on private LTE and 5G networks in airports, warehouses, factories, and other venues. It has worked with Swedish cybersecurity networking outfit Axis Communications and US cybersecurity software firm Evolon on...
Value-add applications supported by the Nokia WiFi Beacon 10 include cybersecurity and gaming optimization
For many communications service providers (CSPs), offering Wi-Fi connectivity is table stakes. But, in an era of hybrid working, latency-sensitive applications, and rapidly evolving technologies, carriers have a two-fold challenge: keep...
Rampant malicious activity in cyberspace hurts individuals, companies, and government agencies, while threatening US national security. The expected release of a new National Cybersecurity Strategy by the Biden Administration is an occasion for us to learn lessons from past efforts to reduce cyber risk,...
Protocol DDoS attack success is measured not by their size but rather their frequency and persistence
Distributed denial-of-service (DDoS) attacks temporarily or indefinitely disrupt services of a host connected to a network to render an entire network or website unavailable. There are three attacks in this...
Extending broadband access has to be the baseline effort to close the digital divide in whatever form it takes, so that the most basic question of, “Is broadband internet service available?” can be answered with a “yes.”
The funding that is pouring into broadband by...
The DNS layer is considered the 'phonebook' of the internet
During an application or Layer 7 distributed denial-of-service (DDoS) attack, a bad actor or actors exploit weaknesses in the layer of a website that interfaces between human input and the site’s technical backend. In Layer...
HTTP flood is the most common type of application layer DDoS attacks
Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. There are...
Comcast Business says it mitigated 24,845 multi-vector DDoS attacks in 2021
Distributed denial-of-service (DDoS) DDoS attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. While larger-scale...
AT&T: 'Volumetric attacks could hit new peaks'
Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. DDoS attacks typically target edge network devices...
Wireless technology has revolutionized the way businesses operate, connecting employees and devices seamlessly. However, with the increasing use of wireless technology comes the need for proper installation and maintenance to ensure network security. Whether you're a business owner or a corporate IT professional, understanding...
Cybersecurity continues its evolution and organizations are focused on it more holistically, as part of business outcomes rather than as component parts, according to Theresa Lanowitz of AT&T. Lanowitz, who is the head of evangelism for AT&T Business' cybersecurity segment, draws on insights gathered...
The move to 5G has led to an explosion of endpoints, providing bad actors with a larger area of attack. AT&T's Rebecca Finnin discusses how using the intelligent networks of the 5G era themselves as security tools can help enterprises and consumers feel less...
Last week, I had an interesting conversation with executives from Betacom about the private wireless segment. They briefed me on their company, the relatively new and rapidly growing private wireless network sector, the communication challenges every company has to solve and what we can...
Trend Micro said that organizations need to integrate resources to combat emerging threats in the private 5G networks field more effectively
Trend Micro has established CTOne, which is a new subsidiary of the company that will focus on advancing 5G network security, the company said...
Apple this week announced three new security features for users of its products
Apple this week announced three new security features for users of its products. The company said it is immediately expanding the scope of end-to-end encryption used to protect data stored on iCloud. And in the new...
ZTNA joins Secure Connect and SD-WAN features, available through Cradlepoint’s NetCloud Exchange
Wireless Wide Area Network (WWAN) solution provider Cradlepoint on Wednesday announced the addition of Zero Trust Network Access (ZTNA) to its NetCloud Exchange (NCX) suite. This marks the third cybersecurity enhancement to NCX,...
How are energy and utility companies thinking about edge computing and the security of that edge?
A newly released report from AT&T looks specifically at how this sector is making use of edge computing and related security concerns. According to the September 2021 survey on...