Remove Digital transformation Remove Internet Remove Risk Remove Telecommunications
article thumbnail

Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk

The Security Ledger

In this Spotlight* podcast, Sayed Wajahat Ali the Senior Director of Security Risk Management at DU TELECOM in the UAE joins us to talk about how digital transformation is shaking up the once-staid telecommunications industry and how his company is staying on top of both the risks and opportunities created by digital transformation.

article thumbnail

Podcast Episode 122: will 5G increase Internet of Things Risk?

The Security Ledger

Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones. But what new kinds of Internet of Things use cases may become possible? Telecommunications firms like to talk up all the great things that so-called 5G cellular networks will bring to smart phones.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Section 889: the US Regulation that extends far beyond the US

IT Security Guru

With the world constantly developing and undergoing digital transformation, the devices we all rely on for both our personal and work lives are increasingly manufactured in countries considered potentially or even actively hostile toward our national interests. government and industry. . contractor or subcontractor and,?

article thumbnail

How a Common API Vulnerability Might Have Cost Telco Optus $1 Million

Security Boulevard

Optus, the second-largest telecommunications company in Australia, has experienced an API security incident – and it might come with a $1 million price tag. Growing API Usage in Telco Sector Increases Security Risks. Moreover, the risk extends far beyond data exfiltration. That’s a huge risk!

article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

We left the COVID-19 crisis behind hoping for a long-awaited return to normality and were immediately plunged into the chaos and uncertainty of a twentieth-century-style military conflict that posed serious risks of spreading over the continent.

DDOS 137
article thumbnail

2023 Cyber Threat Predictions

Digital Shadows

Hosting content on this portion of the internet does however come with challenges for the extortion groups, with internet speeds capped and only individuals with dedicated software—such as the Onion Router (ToR)—capable of accessing breached data.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Started in 1987, the telecommunications provider has become a multinational technology whale. Through a portfolio of real-time protection and risk management products, Imperva is consistently listed as a top vendor. Longtime resident of Redmond, Washington, Microsoft continues to digitally transform for a new generation of technology.

Firewall 120