This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Telecommunications giant T-Mobile has warned that information including names, dates of birth, US Social Security numbers (SSNs), and driver’s license/ID of almost 50 million individuals comprising current, former, or prospective customers has been exposed via a data breach. CSO will update this timeline as events unfold.
Having a risk management framework is essential, because risk can never be totally eliminated; it can only be effectively managed,” says Arvind Raman, CISO at telecommunications company Mitel Networks. The ability to assess and manage risk has perhaps never been more important.
In telecommunications, the skills required are likely to be more technical, whereas in government knowledge around governance and risk are top of the list. In finance and insurance, for example, there will be specific rules that must be followed in different countries and cybersecurity leaders in such organisations may even be liable.
The latest example of that is a group that researchers have dubbed Void Balaur that has been breaking into the mailboxes, social media accounts and telecommunication records of human rights activists, politicians, business executives and other high-profile individuals across a dozen countries.
CISOs throughout the telecommunications industry are preparing their data protection programs for a 5G future that will fully arrive in three to five years. Today, consumers have noticed their cellular devices begin to market and show the 5G label.
On January 6, the United States Federal Communications Commission (FCC) launched a notice of proposed rulemaking (NPRM) to update its data breach reporting rules for telecommunications carriers.
The ITU Telecommunication Standardization Sector (ITU-T) has approved a set of security specifications for internet of things (IoT) systems. The ITU-T is responsible for coordinating standards for telecommunications and information communication technology for cybersecurity.
His talk will focus on the rise in cyber attacks against global telecommunications companies. Sam Curry, the company’s CSO, will also be speaking on Thursday, October 7, 1:05 pm SST, offering practical advice and recommendations for future proofing a business. .
The firm surveyed 492 DFIR professionals in North America and Europe, the Middle East, and Africa working in organizations in industries such as technology, manufacturing, government, telecommunications, and healthcare.
He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. He also serves as an adjunct faculty member at Roosevelt and Benedictine Universities.
The group is known to target telecommunication companies but in recent years has also been observed targeting financial and government institutions. Along with the new variant, another backdoor called Sword2033 was also identified by the researchers. Alloy Taurus, a Chinese APT , has been active since 2012.
According to a report earlier this month by cybersecurity firm SentinelLabs, more recent targets include Polish government agencies, Ukraine's Ministry of Foreign Affairs, Italy's Ministry of Foreign Affairs, individuals within the Indian government, and telecommunications companies that support Ukraine in the ongoing war.
The Department of Justice (DOJ) announced on February 7, 2022, the unsealing of an indictment that charged Chinese telecommunications company Hytera Communications with conspiring with former Motorola Solutions employees to “steal digital mobile radio (DMR) technology from Motorola.”
His credentials were earned in such diverse industries as healthcare, finance, energy, consumer products, and telecommunications. Fun fact: my six years as CSO of Trexin is my first official full-time security role! Question: What encouraged you to join your current company?
The targets have included diplomatic entities, think tanks, non-governmental organizations (NGOs), religious organizations, telecommunication companies, and political activists. To read this article in full, please click here
Australia’s second largest telecommunications provider, Optus, revealed it suffered a cyberattack where data from customers have possibly been accessed. However, the company claims the attack has not affected the platforms and services supporting wholesale, satellite and enterprise customers, and that of enterprise customers.
Related Stories Podcast Episode 112: what it takes to be a top bug hunter Podcast Episode 115: Joe Grand on Unicorn Spotting and Bloomberg’s Supply Chain Story Podcast Episode 113: SAP CSO Justin Somaini and Election Hacks – No Voting Machines Required! Cyber criminals were not forgiving.
Army officer, Sachs served as deputy director of SRI International’s Computer Science laboratory, vice president of national security policy at Verizon Communications, and SVP and CSO of the North American Electric Reliability Corporation. He was also director of the SANS Internet Storm Center.
Hot on the trail of the Federal Zero Trust Strategy comes the Zero Trust and Trusted Identity Management report from the National Security Telecommunications Advisory Committee (NSTAC) headed to President Biden.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content