Industry Collaboration and Standards
Facebook, YouTube and Twitter aren't going to reduce the risk posed by Fake News down to the minimal level needed on their own. It's time they collaborated to get this done - here's how.
ETSI is doing some excellent work to fill a glaring gap in cyber security standards - how you secure AI algorithms.
With the launch of the first 5G Stand Alone (5G SA) networks, mobile network security will never be the same again - here's why and what to do about it.
Will operators step up and support two enterprising individuals from Ericsson and Nokia in defining an ATT&CK-like Framework for the telecom sector?
All but the largest telecom operators should be looking at deploying the STIR/SHAKEN standard for blocking unwanted calls as a service, managed by a vendor partner, rather than building out their own infrastructure.
The new MITRE ATT&CK Evaluations offer free access to high quality, comparative data on EDR product detection capabilities against APTs on an unprecedented scale. Those that need to - and know how to - can make good use of this data.
The new open standard STIX and TAXII 2.1 releases have been approved by OASIS. A new self-certification program should help drive adoption and enable SOC teams to arrive at faster time to detection and time to mitigation.
Orange Polska has released Mixeway, an open source CI/CD security orchestration tool. It needs a lot more work but the GUI and aspiration to correlate vulnerability testing across security tools make it worth taking a look at.
By defining open and transparent network security testing specifications, the leading NGFW vendors supporting NetSecOPEN are looking to usher in a new era in trusted network security testing.
SKT is a world-leader in 5G. This HardenStance Briefing depicts the operator's strategy for 5G services and applications and the contribution A10 Networks is making to SKT's supporting network and network security infrastructure.
80 hackers gathered in Oulu, Finland, over the last week-end of November 2019 to crawl all over Ericsson and Nokia's 5G network products and see what flaws they could find. HardenStance attended and published this Briefing on what happened and why it matters.
This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.