Telecommunications Industry

Telecommunications Industry | News, how-tos, features, reviews, and videos

neon skull sign / danger / caution / threat
Two developers collaborate on a project as they review code on a display in their workspace.

surachai chatchalermpun 16x9
video

CSO Executive Sessions / ASEAN: Surachai Chatchalermpun on securing Huawei in Thailand

Surachai Chatchalermpun – Country Cyber Security & Privacy Officer at Huawei Technologies (Thailand) – joins Xiou Ann Lim for this CSO Executive Sessions interview.

Two developers collaborate on a project as they review code on a display in their workspace.

Malwarebytes pairs new MDR, EDR for overwhelmed cybersecurity teams

Malwarebytes MDR (managed detection and response) works by pairing EDR (end point detection and response) technology with a dedicated team of security analysts, providing both automated and human lines of defense.

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

Top 12 managed detection and response solutions

These MDR services offer human and machine monitoring of your network to identify and respond to the most likely threats.

p1200740

Google updates Chronicle with enhanced threat detection

Google Cloud’s Chronicle will now offer curated threat detection as part of its analytics initiative in the Chronicle SecOps suite.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

Palo Alto debuts Unit 42 team for managed detection and response

Live expert service builds on Palo Alto’s Cortex extended detection and response (XDR) platform provide, offering a managed detection and response (MDR) team for more personalized cybersecurity management and incident response.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Deloitte expands its managed XDR platform

New additions beef up intelligence gathering, threat hunting, and mobile device security.

security command center monitors control center getty goro denkoff

Splashtop teams with Acronis for remote security support

Scalable offering claims to allow security-focused technicians to troubleshoot problems without leaving Acronis console.

handshake

Kaseya closes $6.2 billion Datto deal, vows to cut prices

The IT services software provider promises lower costs for consumers, tight integration between the two companies’ products.

managed security service providers

Palo Alto, Deloitte enter U.S. MSSP market with expanded partnership

The Palo Alto-Deloitte announcement introduces a significant new player into the growing managed security service provider space as organizations increasingly invest in specialized services to address cyberthreats.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

Microsoft expands managed security services offerings with new program

Security Experts allows customers to tap into Microsoft pros for threat hunting, XDR, and modernization.

csea22 005 thumb
video

CSO Executive Sessions / ASEAN: Angel Redoble on leadership

Angel Redoble – Group CISO of PLDT Group and Smart Communications – joins Xiou Ann Lim for this CSO Executive Sessions interview.

cloud security / data protection / encryption / security transition

MITRE: To test and gain confidence in MSSPs, use ATT&CK framework

Companies have greater confidence in their own security teams than in MSSPs, according to a new survey. To better evaluate service provider capabilities, companies can apply techniques used by the ATT&CK (adversarial tactics,...

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

managed security service providers

How to find a security-savvy MSP

Not all managed service providers are strong on security. Here's how to weed out those that will put your small- to medium-sized business at risk.

Digital fingerprints are virtually connected. [tracking / identity / genetics / data privacy]

Supply-chain attack on Kaseya remote management software targets MSPs

REvil ransomware pushers exploit zero-day flaw in Kaseya VSA to infect MSPs and their customers.

lee han ther   maxis

How Maxis’s cybersecurity team enable the Malaysian telco’s digital business

Cybersecurity head Lee Han Ther outlines the transition of the security team from being a “show-stopper to an enabler”, documenting the benefits of acknowledging wider business objectives to drive mutual gains.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

You Might Also Like