YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

Apply game-changing solutions from other verticals to telecom (Reader Forum)

Today businesses are transforming to meet the rising demand from consumers and users who want instant, accurate outcomes on everything from ATM transactions to video analytics for online gaming. Companies that are addressing the demands of our right-now economy by transforming their infrastructure will...

What is Security Service Edge (SSE)?

Gartner's recently-coined Secure Service Edge (SSE) describes the cloud security of SASE without wide area network (WAN).

Three cybersecurity considerations in the 5G era

A panel of telecom cybersecurity experts discuss the issues affecting carriers as they implement 5G Core networks.

Kagan: Protect yourself, your company from Russian cyberattacks

As we watch the continuing war between Russia and Ukraine, there are so many stories, opinions and concerns regarding what is coming next and if it will impact other countries like the United States of America… and how. The White House and other US...

How to understand, map and mitigate 5G cybersecurity risks: An interview with Ande Hazard, AT&T

‘A business’ most valuable assets are data, data and more data' Delivering enterprise-level digital transformation is proving to be a key 5G monetization strategy for operators. This approach, however, comes with a host of cybersecurity implications around things like data privacy and anomaly detection. In...

What is Secure Access Service Edge (SASE)?

Secure Access Service Edge (SASE) has emerged out of necessity to respond to changes in enterprise security, forced by cloud adoption.

Juniper buys zero-trust network access startup WiteSand

Juniper has acquired WiteSand, bolstering its cloud-native zero trust security portfolio with Network Access Control (NAC).

White House, tech companies meet to boost open-source software security

Administration officials met with Amazon, Google and Microsoft and other tech stakeholders to discuss better open-source software security.

Log4J exploits continue: Microsoft

Microsoft said bad actors wasted no time exploiting the recently zero-day exploit of Log4J, Java-based logging software.

Google Cloud IDS simplifies virtual private cloud network threat detection

The new Google Cloud IDS service integrates threat detection for enterprise virtual private clouds (VPCs) hosted by Google Cloud

Well, technically… cybersecurity needs diversity: Tanium’s Shannon Rosales Mirani (Ep. 59)

Shannon Rosales Mirani, senior human resources business partner for global sales at Tanium, comes on the podcast to discuss how prioritizing diversity and equity helps the company to grow and innovate.

Overcoming IoT security threats from the start (Reader Forum)

Here’s the sobering reality: across the Internet of Things (IoT), security has been overlooked. An amazing 1.51 billion IoT devices were breached in the first six months of 2021, an increase from 639 million in the same time period in 2020. With the anticipated...

Kajeet White Paper: IoT Vulnerabilities and the IoT Security Crisis

It’s no secret that the number of connected IoT devices is growing rapidly. Industry experts anticipate nearly 64 billion connected devices by 2025. While IoT devices can power a broad new set of capabilities, the rapid diffusion of connected smart devices across many different...

Cybersecurity and patent abuse hold back industrial IoT’s true potential (Reader Forum)

Between device hijacking, data breaches, and intellectual property theft, there are many known risks associated with a cybersecurity compromise in internet of things (IoT) applications. At the same time, many are excited about the potential IoT offers across enterprise use cases – and for...

Three ways to prevent smart buildings from being hacked (Reader Forum)

Smart buildings ? those that deliver outstanding outcomes for all users, through digital technology, to exceed their evolving expectations ? have the power to transform the way we live, work and communicate. With the right technology at their fingertips, landlords can equip their offices...

Two challenges that come with expanded broadband services

The coronavirus pandemic has led to an intensified focus on broadband availability, as people around the world turned to online services to stay connected, work and learn. Terry Young, who is director of service provider and 5G product marketing for A10 Networks, sees the...

Well, technically… the value of STIR/SHAKEN cannot be overstated: Twilio’s Julie Kearney (Ep. 42)

Robocalls blowing up your phone? Twilio's VP of Communications Regulatory Affairs and Policy details how the TRACED Act and STIR/SHAKEN might finally put an end to that.

Well, technically… 5G has been one big, international fight: Internet Consultant Dominique Lazanski (Ep. 41)

This week, I'm joined by Dominique Lazanski, a consultant who deals mostly in international Internet governance and cybersecurity policy. Dominique talks about China's push to create a less centralized global internet based on native products that reflect China’s policy agenda, and critically, where 5G...

Understanding and implementing a zero-trust cybersecurity strategy

Huawei Technologies USA Chief Security Officer highlights the need for consistent security standards across the telecoms industry With ICT vendor Huawei Technologies largely locked out of the market in the United States and some of its allied countries, the Chinese company is continuing its push...

IoT cybersecurity spend to hit $16.8bn by 2026 as IoT connections triple to 23bn

Revenues from the sale of cybersecurity solutions in the IoT sector will jump to $16.8 billion by 2026, according to ABI Research, as the number of IoT connections nearly triples from 8.6 billion to 23.6 billion connections in the same period. The growth forecast stretches...

Security needs to be core to the future of mobile networks (Reader Forum)

The coming of 5G networks represents a major advancement for the digital age—and it is coming rapidly. As of August 2020, 92 commercial 5G networks have been launched in 38 countries, according to the GSMA. Mobile data traffic is expected to quadruple by 2024, with 25 percent...

Well, technically… 70% of data breaches happen from endpoints: Janet Giesen, Metallic (Ep. 9)

Janet Giesen, VP of operations at Metallic, discusses how the SaaS company adjusted its approach to marketing security products once COVID-19 hit, as well as what enterprises need to keep in mind as their networks expand into employee homes.

Telefónica set for shopping spree after purchase of cybersecurity firm Govertis

Telefónica has purchased Valencia-based cybersecurity firm Govertis for an undisclosed fee, as part of a concerted buying spree. The company will be integrated into the Spain-based carrier’s digital-change unit, Telefónica Tech, and specifically its ElevenPaths cybersecurity sub-division. Telefónica said to expect more acquisitions in...

Huawei Webinar: Why America Needs Strong National Privacy Regulation

The pandemic has highlighted the importance of personal data and digital connectivity, to the detection, treatment, and prevention of COVID-19. The major social media platforms for search, marketing, and transactions involve the collection and use of personal data in historic proportions in ways that...