YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

Bosch launches its cybersecurity procurement platform in the UK

Bosch CyberCompare supports companies and the public sector when purchasing cybersecurity for enterprise IT, Operational Technology and IoT used in production or products German company Bosch announced plans to launch its cybersecurity procurement platform Bosch CyberCompare in the U.K. market. Bosch CyberCompare supports companies and the...

Nokia to invest $248 million to expand its headquarters in Ottawa

Nokia said that this transformation project is expected to create more than 340 new high-value jobs Nokia Canada announced plans to transform its facility in the city of Ottawa into a sustainable research and development (R&D) hub with funding from the federal, provincial and city...

Veolia appoints Orange to supply secure AI and IoT to its water management services

Veolia Water Technologies, the digital solutions arm of French utility services company Veolia, is working with Orange Business Services, the global enterprise division of France-based telecoms operator Orange, to bring new analytics and security to its Hubgrade water cycle management platform. The pair will develop...

Palo Alto Networks secures Telus 5G in Canada

The company’s security products will protect Telus’s 5G core, internet perimeter and IoT deployments Palo Alto Networks announced Wednesday that Canadian telco Telus has selected the company to secure its 5G network. Telus will use Palo Alto’s hardware and software firewalls to protect network interfaces...

‘War, religion and politics’: Real-world conflicts play out in cyberattacks, Netscout report finds

New Netscout report says botnets are "more potent than ever before" Geopolitical tensions involving Russia and Ukraine are being reflected in cyberattacks, while botnets "continue to evolve at a frightening pace," according to a new security report from Netscout. Netscout, which draw the anonymized...

Well, technically… you can’t stop cyberattacks, but you can recover from them: Kyndryl’s Kris Lovejoy and Rhonda Childress (Ep. 80)

While prevention is still important, enabling cohesive architectures and establishing resiliency and recovery tactics is becoming far more critical.

Palo Alto brings next-gen firewall to Azure Marketplace

The VM-Series firewall software secures private Azure-based 4G and 5G MEC Protecting enterprise Multi-Access Edge Computing (MEC) installations against cyberattacks is the impetus behind Palo Alto Networks’ news on Thursday announcing the availability of its VM-Series Next-Generation Firewall (NGFW) software, via Microsoft’s Azure Marketplace. Palo Alto promises...

Orange partners with Netskope for telco cloud Secure Service Edge

The new SSE offering expands Orange’s growing telco cloud cybersecurity portfolio Orange, through its Orange Business Services and Orange Cyberdefense groups, and cybersecurity firm Netskope announced Thursday they’ll embed Secure Service Edge (SSE) functionality in the Orange Telco Cloud platform. The two firms are calling the new solution “carrier-class...

FCC adds China Unicom, PacNet to national security threat list

The FCC noted that these firms are forced to comply with Chinese regulations and could pose an unacceptable risk to national security The U.S. Federal Communications Commission (FCC) has added international telecoms company Pacific Network Corp., its wholly-owned subsidiary ComNet (USA) and the operator China...

Microsoft applying cloud security principles to Open RAN networks

In disaggregated 5G networks, “the attack surface area has increased dramatically,” Microsoft Azure for Operators CTO writes In its purest form, 5G is described as “cloud-native,” meaning that network workloads traditionally performed in purpose-built boxes are now run as software instances in centralized and decentralized...

More isn’t always better: Three dangers of cheap IoT devices

More isn’t always better. Despite the Internet of Things (IoT) growing to 15 billion worldwide devices next year, many are cheap in price and quality. The result is lowering cybersecurity and overloading networks at a time when devices are increasingly entering the home and...

OCSF Project seeks to eliminate cybersecurity ‘data silos’

Splunk, AWS, Broadcom lead the charge around the new framework effort, announced at a Las Vegas hacker conference More than a dozen companies including Amazon Web Services (AWS), Broadcom and data analytics firm Splunk are throwing their weight behind the Open Cybersecurity Schema Framework (OCSF) Project. The...

In telecom cyber security, wicked problems require wicked solutions (Reader Forum)

A new report by Darkhorse Global, a geo-economic and national security consultancy, makes some good points about the convergence of national security and industrial policy frameworks for telecommunications infrastructure. It outlines three “wicked problems” confronting today’s global ICT ecosystem.  First, vulnerabilities exist in all networks, hardware and software. Second,...

Mobile is ‘critical’, but security breaches are on the rise: Verizon report

Remote work/remote access means a larger attack surface -- and the inability to "disconnect" from work may be a factor With the rise of remote and hybrid work, companies are more reliant than ever on mobile devices, and those devices are, increasingly, the main route...

Cato adds data loss prevention capabilities to security service edge platform

DLP keeps sensitive customer records safe with intent-based rules, says Cato Cato Networks on Tuesday announced Cato DLP, a data loss prevention (DLP) engine added to the company’s SSE 360 service. Cato offers SSE 360 as a Security as a Service platform, offering enterprise customers a...

AWS Cloud WAN promises simplified multi-cloud management

Amazon's made AWS Cloud WAN generally available – its SD-WAN as a service for hybrid and multi-cloud deployments.

Well, technically… smart city data is exciting, but it’s also risky: Ubicquia’s Heather Ritchie (Ep. 76)

On this episode, Heather Ritchie, the chief marketing officer at Ubicquia, uses specific smart city projects around the world as examples of the benefits, and the considerations, such initiatives can bring. She also discusses how recent developments, like COVID-19 and 5G, have finally gotten many smart city efforts out of "project purgatory."

Addressing the global rise of the SIM card swap (Reader Forum)

SIM card fraud unfortunately manifests itself in a number of ways, but one of the most pernicious forms is the SIM card swap. SIM card swapping is the process by which a hacker or bad actor obtains the personal information and mobile number of...

GE Healthcare opens 5G lab in India

GE Healthcare said that the 5G lab will serve as a testbed to develop future-ready products and solutions   GE Healthcare announced the inauguration of its 5G Innovation Lab in Bengaluru, India, the company said in a statement. Located at the John F. Welch Technology Centre (JFWTC),...

Cato Networks expands Nordic presence with Copenhagen PoP

Cato Networks promises expanded cybersecurity with faster downtime recovery for Nordic businesses using its new Copenhagen, Denmark PoP.

Telefónica Tech opens ‘Virtual Data Center’ in Ashburn, VA

Telefónica Tech has expanded its Virtual Data Center enterprise cloud migration and security service from Miami to include Ashburn, Virginia.

Nokia opens cybersecurity-based testing lab in Dallas

Nokia said the new lab will serve as a central repository for cybersecurity knowledge that will be shared across Nokia and with its operator, enterprise and government customers   Nokia announced the launch of its Advanced Security Testing and Research (ASTaR) lab in Dallas, Texas. In a...

Dell offers cyberattack recovery as a service

Dell is offering cyberattack recovery as a service for its Apex cloud service customers, and will add support for data warehousing Snowflake.

What is a Cloud Access Security Broker (CASB)?

Cloud Access Security Brokers (CASBs) are foundational components of cloud-centric corporate cybersecurity solutions like SSE and SASE.