article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?

article thumbnail

FCC comes down hard on robocallers with record $300m fine

Malwarebytes

A robocall network makes use of automated software diallers to spam out large numbers of cold calls to unsuspecting recipients. This kind of call will never quite go to plan for anyone other than the individuals operating the robocalling software. We'll be stuck with all manner of robocalling technology for some time to come.

Scams 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

In this blog, we will explain the unique data security challenges for Telcos and three ways how both Thales and Red Hat can help them protect against future API attacks. APIs are software intermediaries that enable two software components to communicate with each other. What are APIs?

article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

You may not have noticed, but there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems over the past couple of years. The ultimate concern with this technology is that we’ll end up in a surveillance society where your I.D. Ubiquitous surveillance. Advanced use cases.

article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

are subject to laws such as the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (the HITECH Act), as well as regulations such as the Clinical Laboratory Improvements Amendments (CLIA). Financial Data Protection Laws.

article thumbnail

Me on the Equifax Breach

Schneier on Security

Hearing on "Securing Consumers' Credit Data in the Age of Digital Commerce". Subcommittee on Digital Commerce and Consumer Protection. For over 30 years I have studied the technologies of security and privacy. I am also a special advisor to IBM Security and the Chief Technology Officer of IBM Resilient. Before the.

article thumbnail

GUEST ESSAY: A primer on best practices for automating supply chain cybersecurity

The Last Watchdog

They point out how supply chains rely on software yet lack the security tools to protect them. Businesses must automatically secure their supply chains to protect themselves and comply with consumer-protection laws. Supply chain professionals have to ensure their technology can scale to meet demand increases.