Remove Authorization Remove Telecommunications Remove Vulnerability
article thumbnail

How Telcos Can Ready Their IT Infrastructures for Telco (Services) Act Compliance

Pure Storage

How Telcos Can Ready Their IT Infrastructures for Telco (Services) Act Compliance by Pure Storage Blog The telecommunications landscape is continually evolving, and with this evolution comes the need for updated regulations and security measures. One of these new regulations is the UK’s Telecommunications Security Framework.

article thumbnail

DHS Announces New Grants to Bolster Cybersecurity Under Infrastructure Law

Security Industry Association

Last week the Department of Homeland Security (DHS) announced a joint effort between the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA) to provide new cybersecurity grants authorized and funded under the Bipartisan Infrastructure Law.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIA New Member Profile: Infinite Electronics

Security Industry Association

The company has established a diversified international customer base in industrial, military/aerospace, transportation, commercial, medical and telecommunications industries. What solutions/services does your business offer in the security industry? And what makes your offerings/company unique?

article thumbnail

IntelligentSIA: 12 Ways to Get Involved With SIA This Month

Security Industry Association

Congress recently passed the Secure Equipment Act, which would require the Federal Communications Commission to limit new authorizations for certain Chinese telecommunications and security equipment. Join us to enjoy complimentary breakfast and get tips and insights on how to present like a pro.

article thumbnail

SIA New Member Profile: Veridas

Security Industry Association

We envision a world where individuals are recognized not by cumbersome passwords or vulnerable keys, nor physical credentials, but privately, securely and voluntarily for who they truly are. This transformation will span into various sectors, including finance, retail, telecommunications, sports, insurance and more.

article thumbnail

How to Prevent Third-Party Vendor Data Breaches

Reciprocity

It found that 8,000 cancer patients’ sensitive health information was accessed without authorization. Hacking of a telecommunications provider. The third-party vendor should be able to demonstrate that it takes risk management seriously and dedicates resources to its vulnerability management program. Lack of encryption.

Audit 52
article thumbnail

Capita Hack: A Case Study of What Not To Do …

Plan B Consulting

The company has a significant presence across various industries, including: government, healthcare, local authorities, finance, telecommunications, and transportation. Staff were unable to access their work systems, as well as affecting clients, such as local authorities.