In order to protect its World Cup network system, Avaya has taken a vow of silence, ITWeek.com reports.By releasing less information about its systems than in past soccer tournaments, Avaya is happy to report that there have been no significant threats to security so far, the article states.“Before we issued detailed network plans,” said Doug Gardner, managing director of Avaya’s Fifa World Cup program. “In the 2002 and 2005 Confederations Cup, we let out too much information. … The marketers were getting ahead of the engineers. Hackers with knowledge of how the network was set up could wreak havoc. We’ve learned lessons and have been a bit quieter this time.”ITWeek.com reports that Avaya plans to issue a white paper after the event is over. Read more about the World Cup at Security Watch at the World Cup.Keep checking in at our Security Feed page, or subscribe via RSS, for updated news coverage. Compiled by Paul Kerstein Related content feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO CSO and CISO C-Suite news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe