Tag

security

Browsing

Five nations have formed a global alliance, ambitiously named the Global Coalition on Telecommunications (GCOT), a promising step towards international cooperation in the telecommunication arena. Set to modernize Open RAN, enhance 6G, and resolve security issues linked to China, this consolidates the efforts of five major entities across UK, Australia, Canada, Japan, and the U.S. The coalition aims to better integrate policy matters and drive growth within the industry. However, uncertainty looms over the form this alliance will take in future, prompting intense interest within the telecom sector.

Journey.ai, a trailblazing cybersecurity software company, has teamed up with Avaya, a leading contact center provider, to bolster security measures while enhancing the agent experience. The integration of Journey’s biometric authentication technology with Avaya Hybrid Cloud Services (HCS) offers a compelling solution for contact centers, replacing conventional password-based authentication with biometric verification.

Browser extensions, hailed for their convenience in enhancing online experiences without leaving the tab, are not without their risks. Google Chrome has taken a significant step towards mitigating these concerns with the impending release of Chrome 117.In an informative blog post by Chrome Developers, Google announced that the upcoming Chrome 117 version will introduce a feature to inform users when an extension they’ve installed becomes unavailable in the Chrome Web Store.

The Biden administration is set to launch a groundbreaking initiative today, introducing a new cybersecurity label for smart devices that aims to bolster security standards and protect consumers from potential threats. Federal Communications Commission (FCC) Chair Jessica Rosenworcel revealed the label, called the US Cyber Trust Mark, during a press briefing. The Cyber Trust Mark will signify that devices bearing it meet stringent security criteria based on the National Institute of Standards and Technology (NIST) report.

TPx, a managed services company that offers cybersecurity, managed networks and cloud communications, has added Penetration Scanning to its Security Advisory Services offering.   TPx Penetration Scanning makes use of an automated scanning platform, which allows for quick turnaround times and cost-effective services. This advanced product expands on TPx’s Vulnerability Scanning, which examines network-connected devices in order to discover possible security leaks.   The combination of penetration and vulnerability scanning when used jointly offers a more thorough method of risk identification and security reinforcement. TPx Vulnerability and Penetration Scan simulates hacker behavior to assist clients evaluate the probability that a criminal will be able to successfully attack a company’s weaknesses in order to obtain access to systems or secret information on the network. Scanners track a company’s risk profile in almost real-time, with the  analysis being conducted as a one-time activity or on a regular basis.   Rick Mace, CEO…

The telecom industry is responsible for keeping the globe linked through communications services. There are many aspects of these services that we take for granted, from private calls to business interactions. However, it is only because of the telecom sector that we are able to swiftly connect to individuals all over the world, whether by phone, internet, airwaves or cables. For years, cybercriminals have targeted telecom operators because they maintain and manage vital communications infrastructure that is used to transport and store vast quantities of private and sensitive data. Cyber-attacks on the telecom industry in particular, have risen dramatically in recent years as technology has advanced and our world has evolved to become more connected. In this article, we hope to shed light on the cyber security threats that the telecommunications sector is facing. Also, explain how providers can defend their digital environments and key infrastructure from possible cyber-attacks Why…

There has recently been a significant surge in Distributed Denial-of-Service (DDoS) assaults all around the world. A DDoS attack is a malicious attempt to interrupt regular traffic to a targeted server, service, or network by flooding the target or its surrounding infrastructure with excessive Internet traffic.   Cloudflare has reported that it has neutralized a Distributed Denial-of-Service attack that leveraged about 15,000 compromised devices and topped at just under 2 Tbps of bandwidth. The assault was believed to have employed a combination of Mirai-infected Internet of Things devices, which are frequently used to conduct enormous DDoS attacks, and unpatched versions of the GitLab developer tool.   The DDoS assault comes only a few weeks after Rapid7 announced a GitLab vulnerability on November 1, 2021, rated a full 10.0 on the CVSS severity scale, that could be leveraged to enable an attacker to remotely run code, and warned that exploitation would…