Tag

CYBER SECURITY

Browsing

In a significant move against the rising menace of spyware, representatives from various countries recently convened in London for the UK – France Cyber Proliferation conference. This gathering underscored the urgent need for international cooperation against the malicious use of cyber tools, an issue that transcends national borders. UK Deputy Prime Minister Oliver Dowden highlighted the importance of joining forces with allied nations to combat cyber threats, positioning the UK as a leader in this global fight.

To uncover the dark secrets behind this staggering figure and delve deep into the issue of AIT fraud, we sat down with Tim Ward, the Vice President of Number Information Services at XConnect. With over three decades of experience in the telecoms industry, Tim Ward brings a wealth of knowledge and insights to the table. At XConnect, he has taken the helm of the Number Information Services division, leading initiatives in sales, marketing, and product management. Under his guidance, XConnect has launched innovative services that set new standards for access to network, service, and user information.

In a strategic move to enhance cybersecurity, Japan’s prominent technology players, including KDDI Corporation, KDDI Research, Inc., Fujitsu Limited, NEC Corporation, and Mitsubishi Research Institute, Inc. (MRI), have joined forces to initiate a groundbreaking endeavor. The project, set to commence on August 1, 2023, entails a series of trials investigating the integration of a Software Bill of Materials (SBOM) into the realm of communication, encompassing 5G and LTE network equipment.

The Biden administration is set to launch a groundbreaking initiative today, introducing a new cybersecurity label for smart devices that aims to bolster security standards and protect consumers from potential threats. Federal Communications Commission (FCC) Chair Jessica Rosenworcel revealed the label, called the US Cyber Trust Mark, during a press briefing. The Cyber Trust Mark will signify that devices bearing it meet stringent security criteria based on the National Institute of Standards and Technology (NIST) report.

Spectrum Enterprise, a division of Charter Communications, Inc., has introduced Secure Access with Cisco Duo and Cloud Security with Cisco+ Secure Connect to its cybersecurity product portfolio. These two additions allow companies to offer safe and secure access to information and applications on private networks or public clouds to employees and other stakeholders. The new cybersecurity protections are integrated with the company’s managed network services portfolio, which includes Managed Network Edge and Enterprise Network Edge solutions. Managed Network Edge and Enterprise Network Edge are modular, all-in-one platforms that simplify the deployment and management of an organization’s network.  While each platform offers slightly different features, both provide routing, SD-WAN, switching, security, remote access, and LAN options. Layering on Secure Access with Cisco Duo and Cloud Security with Cisco+ Secure Connect provides clients with the full protection of a secure access service edge (SASE). Secure Access with Cisco Duo helps protect organizations…

Zimperium, a mobile security solutions provider for endpoints and apps, has unveiled its Mobile-First Security Platform™ to provide an end-to-end mobile security platform for businesses. The platform combines Zimperium Mobile Threat Defense (MTD) and Mobile Application Protection Suite (MAPS) to provide powerful new features for teams tasked with mobile security assurance. The Zimperium Mobile-First Security Platform integrates MTD and MAPS features, allowing for centralized administration and access to device and app security via a single interface on any cloud or on-premises platform. It also provides built-in privacy protection for all devices against various mobile threats including phishing, spyware, and rogue networks. Furthermore, it offers comprehensive in-app protection to avoid reverse engineering, safeguard cryptographic keys, and build self-defending apps. The platform’s expanded mobile environment includes enterprise connections such as SIEMS, IAM, XDR, DevOps workflows, ticketing systems, GitHub actions, and fraud systems. Also, advanced threat hunting is made possible by deep forensics…

Verizon Business has announced that it will provide a variety of network connectivity options to Siemens, a German global technology business, in order to maintain the security of its employees’ devices and data. The solutions will provide Siemens employees in smaller office locations with a smooth “plug and play” user experience while emphasizing security and zero trust principles. Siemens’ zero-trust initiative demands that all employee devices be verified, approved and continually checked before access to mission-critical applications and data is granted or retained. Verizon Business will implement an “internet only” connection, such as a global Managed Wide Area Network based on Cisco Meraki technology, which is vital to the success of the Siemens’ “never trust, always verify” program. According to Sanjiv Gossain, EMEA Vice President, Verizon Business, an intelligent network may make underlying architectures more agile by controlling traffic and improving operational efficiency. He noted that while every…

We may not always realize it, but we spend a good part of our lives online. We frequently reveal our names, addresses and credit card numbers when accessing shopping and social networking sites, and trust those sites to keep us and our information secure. You lock the door when you wish to keep your home safe. The same should apply on the Internet, where we can considerably limit our exposure to a variety of hazards by implementing a modest number of Internet safety measures. You know what they say – the Internet is like your front door: a lock doesn’t do much good if you leave the key under the welcome mat. Is it safe to be in the Internet? Learning about cybersecurity and online safety might feel like swimming through a sea of technical jargon. There are several cybersecurity terminologies to be familiar with, but we’ve selected a handful of…

More than 130,000 Telstra customers’ personal information has been made public online. According to the company, there was no cyberattack involved; rather, the issue was caused by a “misalignment of databases” as stated by Telstra. The incident is the most recent in a string of massive, unauthorized exposures of personal information in Australia.   The telecom giant confessed that the information, which included the names, addresses and phone numbers of customers who had requested that their information be kept confidential, had been published on the White Pages and Directory Assistance Services websites. Telstra’s routine auditing procedures revealed the data leak.    Following the finding, Telstra began contacting affected consumers and is providing free identity theft protection services. The corporation claims to have since deleted the consumer information from public view.   “Protecting our customers’ privacy is absolutely paramount, and for the customers impacted we understand this is an unacceptable breach…