The pandemic’s legacy for cyber security should be a secure innovation culture; convergence of network and security at the edge; better segmentation of network domains at home; and concerted action against ransomware. View the White Paper
Vodafone Business is finally making a respectable commitment to security services. Trebling security revenues by 2025 looks achievable. View the briefing
A new HardenStance blog on Light Reading proposing an approach to collaborating on AI security standards that can complement Orange’s new Data & AI Ethics Council. View the blog
My guest blog for Palo Alto Networks, setting out the “Four ‘P’s of 5G Network Visibility”: visibility into protocols, perimeters, permissions and partners.” View the blog
Looking into some recent real world telco security incidents highlights just how unhelpful a myopic focus on APTs, Chinese vendor software and 3GPP features can be to telco security.
Facebook, YouTube and Twitter aren't going to reduce the risk posed by Fake News down to the minimal level needed on their own. It's time they collaborated to get this done - here's how.
ETSI is doing some excellent work to fill a glaring gap in cyber security standards - how you secure AI algorithms.
With the launch of the first 5G Stand Alone (5G SA) networks, mobile network security will never be the same again - here's why and what to do about it.
Will operators step up and support two enterprising individuals from Ericsson and Nokia in defining an ATT&CK-like Framework for the telecom sector?
All but the largest telecom operators should be looking at deploying the STIR/SHAKEN standard for blocking unwanted calls as a service, managed by a vendor partner, rather than building out their own infrastructure.
Managed Detection and Response (MDR) is a critical cybersecurity service category. Sponsored by AT&T, Secureworks, Fortinet and ElevenPaths, this White Paper guides users on what to expect both from their provider and themselves in an MDR partnership.
The new MITRE ATT&CK Evaluations offer free access to high quality, comparative data on EDR product detection capabilities against APTs on an unprecedented scale. Those that need to - and know how to - can make good use of this data.