article thumbnail

Configuration as code: securing the cloud

TM Forum

The great migration to the cloud has created lucrative opportunities for telecommunications companies to generate revenue. Configuration as code is the best available approach to secure and modernize cloud infrastructure. However, while telecommunications companies have been quick to adopt the cloud, data breaches are on the rise.

Cloud 130
article thumbnail

Part 1: Guarding against sophisticated threats: Strategies for your best defense

CIO Business Intelligence

This formidable threat group poses significant challenges to telecommunications, technology and software automation industries. Muddled Libra has a signature move: exploit the 0ktapus phishing kit to craft believable authentication pages and manipulate victims through social engineering. Cybercrime, Security

Strategy 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FCC Enacts Rules Against SIM Swapping to Protect Mobile Phone Users

SecureWorld News

Federal Communications Commission (FCC) has adopted new rules aimed at enhancing security measures for cell phone accounts. The new rules, initially proposed in July 2023, mandate wireless providers to adopt secure methods of authenticating customer identity before redirecting phone numbers to new devices or carriers.

Mobile 86
article thumbnail

Hackers backed by Russian government reportedly breached US government agencies

The Verge

The same Russian government hacking group responsible for a security breach at FireEye compromised the Treasury and Commerce departments and other US government agencies, The Washington Post reported. Illustration by Alex Castro / The Verge. Several federal law enforcement agencies, including the FBI, are investigating the breach.

article thumbnail

5G-enabled manufacturing: Realizing Industry 4.0

TM Forum

project, a consortium of manufacturing, IT and telecommunications companies and organizations, worked together to explore the use cases and expected benefits to the Ford Motor company. Security by design. Vodafone ensured the 5G mobile private network was secure by design and embedded across the architecture from the beginning.

Industry 130
article thumbnail

How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack

GeekWire

Editor’s Note: Independent security consultant Christopher Budd worked previously in Microsoft’s Security Response Center for 10 years.]. 13 , saying “[h]ackers broke into the [National Telecommunications and Information Administration] NTIA’s office software, Microsoft’s Office 365. It’s a method for authentication (i.e.

Cloud 145
article thumbnail

Security attacks and countermeasures

Cloud Musings

Johnson Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. by Sandra K. For example, recent breaches include 3.65

Security 159