YOU ARE AT:TagsCybersecurity

BROWSING: cybersecurity

New IoT cybersecurity labeling proposed

New FCC effort seeks alignment with NIST principles on cybersecurity The Biden administration and the Federal Communications Commission are working on a product labeling effort focused on standards for cybersecurity in consumer and IoT products. A new "U.S. Cyber Trust Mark" program has been proposed...

The value of privileged access to your security budget (Reader Forum)

For many organizations, cybersecurity continues to be a growing concern. As data breaches become increasingly frequent, companies are starting to find more room in their budgets for security-focused initiatives. Privileged Access Management (PAM) is a crucial part of any cybersecurity strategy that governs authorized...

DDoS attacks using IoT bots have jumped five-fold in 12 months, says report

Botnet traffic forcing a distributed denial of service (DDoS) on IoT networks, originating from insecure IoT devices, increased five-fold over the past year. This is the key finding from a new report on IoT cybersecurity vulnerabilities by Finnish vendor Nokia, plus others. The report,...

Verizon DBIR: Ransomware accounts for one in four data breaches

Verizon's annual report on data breaches says cost & frequency of ransomware attacks has been rising The costs of ransomware attacks are on the rise, with the median cost per incident having more than doubled over the past two years, according to Verizon's annual Data...

Dish loses 81,000 wireless customers, records $30 million in cyber-attack costs

Company says no customer databases breached during cybersecurity incident in February, but employee data was extracted Dish Network continues to lose wireless customers, seeing 81,000 subscribers leave the service during the first quarter of the year as well as a loss of 552,000 pay-TV subscribers....

ChatGPT and cybersecurity: Data breaches, system vulnerabilities and malicious use (Reader Forum)

When ChatGPT first became available in the fall of 2022, most people were in awe of the advances generative AI technology had made, as well as inspired by its promise of increased efficiency and productivity — especially for businesses. However, such technologies also involve...

Test and Measurement: DEKRA buys IoT cybersecurity firm

International test house DEKRA has acquired Taiwan-based Onward Security as part of its goal to expand its portfolio in cybersecurity product testing and certification. Onward Security focuses on cybersecurity compliance solutions for companies in IoT and industrial IoT device manufacturing, as well as automotive, industrial...

Betacom intros AI surveillance system for private 5G in Industry 4.0 venues

Network design and services firm Betacom has developed a perimeter surveillance solution to run on private LTE and 5G networks in airports, warehouses, factories, and other venues. It has worked with Swedish cybersecurity networking outfit Axis Communications and US cybersecurity software firm Evolon on...

Nokia helping CSPs monetize Wi-Fi beyond connectivity

Value-add applications supported by the Nokia WiFi Beacon 10 include cybersecurity and gaming optimization For many communications service providers (CSPs), offering Wi-Fi connectivity is table stakes. But, in an era of hybrid working, latency-sensitive applications, and rapidly evolving technologies, carriers have a two-fold challenge: keep...

New cybersecurity strategy must stress accountability (Reader Forum)

Rampant malicious activity in cyberspace hurts individuals, companies, and government agencies, while threatening US national security. The expected release of a new National Cybersecurity Strategy by the Biden Administration is an occasion for us to learn lessons from past efforts to reduce cyber risk,...

What is a protocol DDoS attack?

Protocol DDoS attack success is measured not by their size but rather their frequency and persistence Distributed denial-of-service (DDoS) attacks temporarily or indefinitely disrupt services of a host connected to a network to render an entire network or website unavailable. There are three attacks in this...

Four challenges facing broadband expansion

Extending broadband access has to be the baseline effort to close the digital divide in whatever form it takes, so that the most basic question of, “Is broadband internet service available?” can be answered with a “yes.”  The funding that is pouring into broadband by...

Application layer DDoS attacks: What is a DNS flood?

The DNS layer is considered the 'phonebook' of the internet During an application or Layer 7 distributed denial-of-service (DDoS) attack, a bad actor or actors exploit weaknesses in the layer of a website that interfaces between human input and the site’s technical backend. In Layer...

Application layer DDoS attacks: What is an HTTP(S) flood?

HTTP flood is the most common type of application layer DDoS attacks Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. There are...

DDoS trends: What are multi-vector attacks?

Comcast Business says it mitigated 24,845 multi-vector DDoS attacks in 2021 Distributed denial-of-service (DDoS) DDoS attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. While larger-scale...

DDoS trends: Volumetric attacks are on the rise

AT&T: 'Volumetric attacks could hit new peaks' Distributed denial-of-service (DDoS) attacks refer to a malicious actor or actors temporarily or indefinitely disrupting services of a host connected to a network to render an entire network or website unavailable. DDoS attacks typically target edge network devices...

The role of wireless technology and installation for network security (Reader Forum)

Wireless technology has revolutionized the way businesses operate, connecting employees and devices seamlessly. However, with the increasing use of wireless technology comes the need for proper installation and maintenance to ensure network security. Whether you're a business owner or a corporate IT professional, understanding...

AT&T on 2023: Getting serious about cybersecurity at the edge

Cybersecurity continues its evolution and organizations are focused on it more holistically, as part of business outcomes rather than as component parts, according to Theresa Lanowitz of AT&T. Lanowitz, who is the head of evangelism for AT&T Business' cybersecurity segment, draws on insights gathered...

Well, technically… the desire for simple needs to be applied to security (Ep. 90): AT&T’s Rebecca Finnin

The move to 5G has led to an explosion of endpoints, providing bad actors with a larger area of attack. AT&T's Rebecca Finnin discusses how using the intelligent networks of the 5G era themselves as security tools can help enterprises and consumers feel less...

Kagan: Conversation with Betacom on private wireless growth

Last week, I had an interesting conversation with executives from Betacom about the private wireless segment. They briefed me on their company, the relatively new and rapidly growing private wireless network sector, the communication challenges every company has to solve and what we can...

Trend Micro unveils new subsidiary for 5G cybersecurity

Trend Micro said that organizations need to integrate resources to combat emerging threats in the private 5G networks field more effectively Trend Micro has established CTOne, which is a new subsidiary of the company that will focus on advancing 5G network security, the company said...

Apple expands end-to-end iCloud encryption

Apple this week announced three new security features for users of its products Apple this week announced three new security features for users of its products. The company said it is immediately expanding the scope of end-to-end encryption used to protect data stored on iCloud. And in the new...

Cradlepoint locks down wireless WANs with Zero Trust Network Access

ZTNA joins Secure Connect and SD-WAN features, available through Cradlepoint’s NetCloud Exchange Wireless Wide Area Network (WWAN) solution provider Cradlepoint on Wednesday announced the addition of Zero Trust Network Access (ZTNA) to its NetCloud Exchange (NCX) suite. This marks the third cybersecurity enhancement to NCX,...

How are energy and utility companies thinking about edge and security?

How are energy and utility companies thinking about edge computing and the security of that edge? A newly released report from AT&T looks specifically at how this sector is making use of edge computing and related security concerns. According to the September 2021 survey on...