Industry Collaboration and Standards
Orange Polska has released Mixeway, an open source CI/CD security orchestration tool. It needs a lot more work but the GUI and aspiration to correlate vulnerability testing across security tools make it worth taking a look at.
By defining open and transparent network security testing specifications, the leading NGFW vendors supporting NetSecOPEN are looking to usher in a new era in trusted network security testing.
SKT is a world-leader in 5G. This HardenStance Briefing depicts the operator's strategy for 5G services and applications and the contribution A10 Networks is making to SKT's supporting network and network security infrastructure.
80 hackers gathered in Oulu, Finland, over the last week-end of November 2019 to crawl all over Ericsson and Nokia's 5G network products and see what flaws they could find. HardenStance attended and published this Briefing on what happened and why it matters.
This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.
The U.S. District Court for the Northern District of California has dismissed the NSS Labs Anti Trust lawsuit against AMTSO. Thank goodness.
The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.
The NSS Labs apology to CrowdStrike and resolution of their lawsuits is progress as far as it goes. But it still leaves outstanding the NSS antitrust suit against AMTSO.
It's clear from the proof-points offered up in a recent webcast that IBM Security and Cisco are serious about their cyber security alliance. In the near future, though, the partners will disrupt the cyber security market at the margins rather than transforming it.
ETSI TC Cyber has released a new security standard that allows telcos to run core public telecom services in - wait for it - public clouds. Here's how it works and what it means for the telecom ecosystem.
AI isn't a 'silver bullet' for cyber security, neither does it need to represent unacceptable risk. Drawing on research into the experience of early adopters, this White Paper provides guidance on what to expect from AI in cyber security..
Government and government cyber security agencies can be very helpful in getting telco security spending signed off. Telco security professionals should be looking to exploit those opportunities.