article thumbnail

Configuration as code: securing the cloud

TM Forum

The great migration to the cloud has created lucrative opportunities for telecommunications companies to generate revenue. In addition to creating revenue opportunities, the cloud has provided a modern approach for telecommunications companies to empower their workforces to work remotely. How does configuration as code get implemented?

Cloud 130
article thumbnail

Part 1: Guarding against sophisticated threats: Strategies for your best defense

CIO Business Intelligence

This formidable threat group poses significant challenges to telecommunications, technology and software automation industries. Muddled Libra has a signature move: exploit the 0ktapus phishing kit to craft believable authentication pages and manipulate victims through social engineering. Tune in and stay updated.

Strategy 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FCC Enacts Rules Against SIM Swapping to Protect Mobile Phone Users

SecureWorld News

These fraudulent activities not only compromise wireless account access but also pose significant risks to financial accounts, social media profiles, and other online services utilizing phone numbers for multi-factor authentication (MFA).

Mobile 91
article thumbnail

Hackers backed by Russian government reportedly breached US government agencies

The Verge

Reuters reported that in addition to hacking Treasury and the Commerce Department’s National Telecommunications and Information Administration (NTIA), the hackers may have breached other US government entities. It’s not yet clear exactly what information may have been stolen or which foreign government was involved.

article thumbnail

US and Europe will block some Russian banks from SWIFT

The Verge

SWIFT, which stands for The Society for Worldwide Interbank Financial Telecommunication, is a cooperative company based in Belgium, whose owners include many of Europe’s largest banks. The organization’s eponymous payments network does not actually exchange money but is used to authenticate payment instructions between banks.

Banking 98
article thumbnail

5G-enabled manufacturing: Realizing Industry 4.0

TM Forum

project, a consortium of manufacturing, IT and telecommunications companies and organizations, worked together to explore the use cases and expected benefits to the Ford Motor company. and the factory of the future. 5G Enabled Manufacturing (5GEM). Securing the MPN was a key feature of this.

Industry 130
article thumbnail

How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack

GeekWire

13 , saying “[h]ackers broke into the [National Telecommunications and Information Administration] NTIA’s office software, Microsoft’s Office 365. This also means that defenders need to increase the security and monitoring of their cloud services authentication systems and infrastructure from now on. 21; and Dec. Meanwhile on Dec.

Cloud 145