ETSI is doing some excellent work to fill a glaring gap in cyber security standards - how you secure AI algorithms.
All but the largest telecom operators should be looking at deploying the STIR/SHAKEN standard for blocking unwanted calls as a service, managed by a vendor partner, rather than building out their own infrastructure.
Research by the Delft University of Technology, carried out in partnership with KPN, the Dutch Ministry of Economic Affairs and others, suggests consumers may be more willing to engage in cleaning up IoT infections than they tend to be given credit for.
A compromised home network threatens other users and infrastructure, not just the immediate residents. This new White Paper looks at what can be done about it and who by.