Remove business telecoms
article thumbnail

The Troublemaker CISO: Get the Organizational Basics Right

Data Breach Today

CISOs need board access and a handle on the company business, writes Ian Keller, director of security at a telecom company. Security Director Ian Keller Tells You How to Become Enabled to Fix What's Broken Getting cybersecurity right means CISOs need peer relationships with other operations executives.

article thumbnail

Fraudsters Are Using Google Forms to Evade Email Filters

Data Breach Today

Emails Are Likely a Reconnaissance Mission for Future Email Compromise Fraudsters are using Google forms to target retail, telecom, healthcare, energy and manufacturing companies in an apparent reconnaissance campaign to identify targets for a possible follow-up business email compromise attack.

Retail 274
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

House Passes Bills on Both Supply Chain, Telecom Security

Data Breach Today

Legislation Targets DHS SBOM, Further Chinese Telecom Restrictions In a busy congressional day for cybersecurity legislation, the U.S. House of Representatives passed several bills on Wednesday, targeting both software supply chain and telecommunication system security. citizens."

Security 167
article thumbnail

FCC Updated Data Breach Notification Rules Go into Effect Despite Challenges

Hunton Privacy

Two trade groups, the Ohio Telecom Association and the Texas Association of Business, petitioned the United States Court of Appeals for the Sixth Circuit and Fifth Circuit, respectively, to vacate the FCC’s Order modifying the Rules. They were adopted in December 2023 pursuant to an FCC Report and Order (the “Order”).

article thumbnail

Thales 2023 Data Threat Report: The Increased Telco Cybersecurity Challenges in the 5G Era

Thales Cloud Protection & Licensing

The substantial changes in the 5G ecosystem bring new dimensions to the telecom threat landscape and opportunities for malicious actors to exploit network security vulnerabilities. The operational data on which they run their businesses is a notable target for fraud.

article thumbnail

How IBM is helping accelerate AI adoption and application centric connectivity

IBM Big Data Hub

Accelerating AI adoption and skills for the telecoms sector The AI skills gap is very real: executives estimate that 40% of their workforce will need to reskill as a result of implementing AI and automation over the next three years. The telecom industry is no exception.

Cloud 100
article thumbnail

MY TAKE: lastwatchdog.com receives recognition as a Top 10 cybersecurity webzine in 2021

The Last Watchdog

Expect content that is always accurate and fair, with recent posts exploring the monitoring of complex modern networks, telecom data breaches that expose vast numbers of mobile users, efforts to make software products safer and ransomware attacks on global supply chains. Pulitzer Prize-winning business journalist Byron V.