903 Results

Security

Search

Spectrum Enterprise, a division of Charter Communications, Inc., has introduced Secure Access with Cisco Duo and Cloud Security with Cisco+ Secure Connect to its cybersecurity product portfolio. These two additions allow companies to offer safe and secure access to information and applications on private networks or public clouds to employees and other stakeholders. The new cybersecurity protections are integrated with the company’s managed network services portfolio, which includes Managed Network Edge and Enterprise Network Edge solutions. Managed Network Edge and Enterprise Network Edge are modular, all-in-one platforms that simplify the deployment and management of an organization’s network.  While each platform offers slightly different features, both provide routing, SD-WAN, switching, security, remote access, and LAN options. Layering on Secure Access with Cisco Duo and Cloud Security with Cisco+ Secure Connect provides clients with the full protection of a secure access service edge (SASE). Secure Access with Cisco Duo helps protect organizations…

Zimperium, a mobile security solutions provider for endpoints and apps, has unveiled its Mobile-First Security Platform™ to provide an end-to-end mobile security platform for businesses. The platform combines Zimperium Mobile Threat Defense (MTD) and Mobile Application Protection Suite (MAPS) to provide powerful new features for teams tasked with mobile security assurance. The Zimperium Mobile-First Security Platform integrates MTD and MAPS features, allowing for centralized administration and access to device and app security via a single interface on any cloud or on-premises platform. It also provides built-in privacy protection for all devices against various mobile threats including phishing, spyware, and rogue networks. Furthermore, it offers comprehensive in-app protection to avoid reverse engineering, safeguard cryptographic keys, and build self-defending apps. The platform’s expanded mobile environment includes enterprise connections such as SIEMS, IAM, XDR, DevOps workflows, ticketing systems, GitHub actions, and fraud systems. Also, advanced threat hunting is made possible by deep forensics…

According to Cisco’s first-ever Cybersecurity Readiness Index, just 15% of global organizations are rated to have the ‘Mature’ level of preparation required to be resistant to current cybersecurity hazards. The index illustrates where organizations are succeeding in cybersecurity preparedness and where deficiencies may worsen if global business and security leaders do not act.   The analysis assesses a company’s ability to sustain cybersecurity resilience in the face of new threats, and includes 19 distinct solutions across five basic pillars: identity, devices, networks, application workloads and data. In a poll of 6,700 private sector cybersecurity leaders from 27 markets, participants were questioned as to which of these technologies they had installed and the current stage of deployment. Businesses were then divided into four readiness stages: beginner, formative, progressive and mature.   More than half (55%) of companies polled worldwide are in the Beginner (8%) or Formative (47%) stages of cybersecurity readiness,…

TPx, a managed services company that offers cybersecurity, managed networks and cloud communications, has added Penetration Scanning to its Security Advisory Services offering.   TPx Penetration Scanning makes use of an automated scanning platform, which allows for quick turnaround times and cost-effective services. This advanced product expands on TPx’s Vulnerability Scanning, which examines network-connected devices in order to discover possible security leaks.   The combination of penetration and vulnerability scanning when used jointly offers a more thorough method of risk identification and security reinforcement. TPx Vulnerability and Penetration Scan simulates hacker behavior to assist clients evaluate the probability that a criminal will be able to successfully attack a company’s weaknesses in order to obtain access to systems or secret information on the network. Scanners track a company’s risk profile in almost real-time, with the  analysis being conducted as a one-time activity or on a regular basis.   Rick Mace, CEO…

Following a period of public debate, the UK government has decided on new security requirements for telecom providers. It now intends to introduce the Electronic Communications (Security) Measures Regulations 2022 and an accompanying Telecommunications Security Code of Practice to Parliament before the regulations take effect.   The new rules seek to better secure UK telecoms networks from cyberattacks. Once in effect, telecoms businesses will be expected to follow tight standards around network failure or the theft of sensitive data, with the regulatory agency Ofcom receiving additional powers to verify providers are adopting suitable and proportional security measures.   The government declared that the new telecommunications security legislation, designed in collaboration with the National Cyber Security Centre (NCSC), will be among the toughest in the world and will provide the UK with much stronger measures. They will strengthen the UK’s cyber resilience by incorporating strong security practices into providers’ long-term investment…

ESET, a multinational cybersecurity company, has introduced a new suite of solutions for the telecom and ISP industries, with the goal of providing consumers with comprehensive protection. The newly released ESET NetProtect suite provides network operators and end users with the tools they need to battle complex and evolving mobile threats.   The new ESET NetProtect can safeguard consumer devices linked to telecom and ISP networks from harmful web domains or domain risks such as malware, phishing and possibly undesirable material via mobile or fixed network connections. End users may utilize the ESET NetProtect administration interface to modify their connected devices’ ESET NetProtect settings, manage their domain whitelists and blacklists, and receive security reports.   These network-level solutions do not require any software installation on end-user devices because they’re compatible with every Internet-connected device, including iOS and Android, thanks to their integration into telco and ISP network services and proven…

The Federal Communications Commission (FCC) has named Kaspersky Lab, a Moscow-based cybersecurity business and developer of popular antivirus software, as one of the organizations posing an unacceptable danger to US national security.   Kaspersky is the first Russian company to be added to the list, which is currently dominated by Chinese telecoms companies. The FCC has now released its most recent list of untrustworthy vendors, which includes, for the first time, a non-Chinese company: Kaspersky. Kaspersky joins Huawei Technologies, ZTE Corporation, Hytera, Hangzhou Hikvision Digital Technology Company, Dahua Technology Company, China Telecom (Americas) and China Mobile International USA on the list.   Once a company has been included on the list, it is illegal for that organization to use federal subsidies, which are distributed through the FCC’s $8 billion yearly Universal Service Fund, or to buy any of its products or services. Domestic consumers, with the exception of government employees,…

The telecom industry is responsible for keeping the globe linked through communications services. There are many aspects of these services that we take for granted, from private calls to business interactions. However, it is only because of the telecom sector that we are able to swiftly connect to individuals all over the world, whether by phone, internet, airwaves or cables. For years, cybercriminals have targeted telecom operators because they maintain and manage vital communications infrastructure that is used to transport and store vast quantities of private and sensitive data. Cyber-attacks on the telecom industry in particular, have risen dramatically in recent years as technology has advanced and our world has evolved to become more connected. In this article, we hope to shed light on the cyber security threats that the telecommunications sector is facing. Also, explain how providers can defend their digital environments and key infrastructure from possible cyber-attacks Why…

One of the most frequently asked questions about a VoIP phone system is fundamental and critical, and is as follows: is VoIP secure? To answer the question, no phone system is bulletproof. VoIP has a myriad of benefits, but possible security risks should not be overlooked.   Given the growing number of cybercrimes around the world, the importance of security has never been more significant. In every practical sense, VoIP has a good reputation as a secure technology. Nevertheless, every time you use electronic devices or the Internet, it is wise to understand the security risks that such usage may pose to your business and take appropriate precautions. You might be wondering, how important VoIP security really is? Even if you yourself have never been a victim, the reality is that the threat of security breaches through the phone system is quite serious.   Truthfully, security is a must for…

The GSMA, an industry organization representing the interests of global mobile network operators, has announced that major vendors ZTE, Ericsson, Huawei and Nokia have passed an independent security audit of product development and lifecycle management processes and intend to submit a network kit for evaluation in the second test round. This testing system is called the Network Equipment Security Scheme (NESAS) and claims to have been designed to increase industry confidence in telecommunications network equipment while promoting a more coordinated mobile market. NESAS was jointly established by GSMA and 3GPP. NESAS provides an industry-wide security assurance framework to improve the level of security throughout the mobile industry. The scheme defines security requirements and an assessment system for secure product development and product life cycle processes, and uses 3GPP-defined security test cases to assess the security of network equipment. The audits are conducted by world-class security auditing companies on…