Regulations

FCC Moves to Protect Undersea Cables from Foreign Threats
Infrastructure & Network Security FCC Moves to Protect Undersea Cables from Foreign Threats

In today's interconnected world, the security of undersea internet cables has become a vital national concern. Rupert Marais, an expert in telecommunications security, offers his insights into the actions being taken by the US to safeguard these critical infrastructures from foreign influences.

SK Telecom Faces New Regulations After Major Cybersecurity Breach
Endpoint & Device Security SK Telecom Faces New Regulations After Major Cybersecurity Breach

In today's cybersecurity landscape, breaches are becoming more commonplace, and the stakes are higher than ever. Recently, South Korea took decisive action against its largest mobile telecommunications provider, SK Telecom, following a breach that exposed sensitive data and compromised

Should Cyberattack Disclosure Be Mandatory for Businesses?
Infrastructure & Network Security Should Cyberattack Disclosure Be Mandatory for Businesses?

In today's digital era, cyberattacks have become alarmingly frequent, striking businesses with a precision and tenacity that is both unsettling and relentless. Reports suggest that a staggering number of companies face cyber threats daily. But beyond the numbers lies a critical question: Are

Hill Associates to Pay $14.75M for Fraudulent Billing Practices
Security Operations & Management Hill Associates to Pay $14.75M for Fraudulent Billing Practices

A tidal wave of legal action recently captured industry attention, as Hill Associates, a Maryland-based IT consultancy firm, agreed to a $14.75 million settlement over allegations of fraudulent billing practices with the U.S. government. This event offers a compelling lens through which to examine

Deepfake Technology Impersonations – Review
Identity & Access Management Deepfake Technology Impersonations – Review

The digital realm faces an escalating menace, where malevolent campaigns harness artificial intelligence to impersonate public figures with unparalleled accuracy. In a striking incident, the imposter replicated the voice and writing style of U.S. Secretary of State Marco Rubio, disrupting diplomacy

AI-Driven Cybersecurity Solutions – Review
Identity & Access Management AI-Driven Cybersecurity Solutions – Review

In an era where digital landscapes are increasingly vulnerable to threats, AI-driven cybersecurity solutions have emerged as a beacon of technological advancement. These sophisticated systems promise to revolutionize how businesses, especially small to midsize establishments, safeguard their

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later