article thumbnail

Washington state AG says T-Mobile is wrongly withholding documents in security probe

GeekWire

T-Mobile CEO Mike Sievert, speaking at a Technology Alliance event in Seattle in May, said security breaches have been a catalyst “to make sure we have the right technology, the right architecture that’s fundamentally protected, and the right level of investment.”

Mobile 112
article thumbnail

Cisco research highlights network complexity, security challenges

Network World

Today’s enterprises need more help managing and securing their distributed networking environments than they ever have, Cisco concludes in its Global Networking Trends Report. Second, is moving more security tools to the cloud to protect the increasingly distributed infrastructure and workforce better.”

Network 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Siemens Mobility scales RPA by empowering employees

CIO Business Intelligence

Siemens Mobility has been on a robotic process automation (RPA) journey for years, growing from five automated processes in 2017 to more than 700 now, transforming the company in the process. There was just one book [on RPA] on the market back in 2017, where today you have hundreds,” says Benjamin Bock, head of RPA at Siemens Mobility. “By

Mobile 111
article thumbnail

Sophisticated Attacks Against Mobile Devices Surge 187%

SecureWorld News

In today's interconnected world, mobile devices have become an integral part of our lives, enabling seamless communication, productivity, and access to sensitive information. However, as reliance on mobile technology grows, so does the risk of cyber threats targeting these devices.

Mobile 87
article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO Business Intelligence

Security and risk management pros have a lot keeping them up at night. The era of AI deepfakes is fully upon us, and unfortunately, today’s identity verification and security methods won’t survive. A prime example is the recent attack that injected an AI deepfake video feed to defraud a Hong Kong company for $25 million.

Security 106
article thumbnail

Enhancing Maritime Security: Lessons from the Key Bridge Incident

SecureWorld News

So, we are more and more dependent on the security and resilience of the systems running critical infrastructure—maritime in this case. A Sector Specific Agency (SSA) was identified for each critical sector, with the Department of Homeland Security (Transportation Security Administration and U.S.

article thumbnail

Mobile private network technology enablers

TM Forum

Mobile private networks (MPNs) use the same kinds of network elements as public or macrocellular networks, which consist of a radio access network (RAN) and core. Communications service providers (CSPs) are modernizing public mobile networks to exploit the potential of cloud and edge computing, and MPNs will do the same.

Mobile 130