Building the Future of Connectivity: Boost Mobile and Cisco's Collaborative Journey

Building the Future of Connectivity: Boost Mobile and Cisco's Collaborative Journey

In an era where connectivity is paramount, Boost Mobile has emerged as a formidable player in the telecommunications landscape. As part of Dish Network, Boost Mobile provides robust and reliable wireless services to over 240 million customers. We had the opportunity to sit down with Mike (Mac) McNamara, Vice President and Head of Network Engineering for Boost Mobile, to discuss the challenges, solutions, and outcomes of the company’s ambitious 5G network deployment and the pivotal…

Read More

AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T Hack Exposed ‘Nearly All’ Customer Phone Numbers

AT&T disclosed today that data from “nearly all” of its customers from May 1, 2022 to October 31, 2022 and on January 2, 2023 was exfiltrated to a third-party platform in April 2024. Customers whose data was exposed will be informed. AT&T said the access point through which the cyberattack was conducted has been secured, and the data is no longer available. Threat actor accessed phone numbers and call durations According to AT&T, the threat…

Read More

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

Navigating cybersecurity in telecommunications: The FCC's 7-day rule

The telecommunications industry underpins global communication and powers our digital world. Cybercriminals, however, have also become increasingly sophisticated in the threats they pose against such critical infrastructure. Recent developments, like the Federal Communications Commission’s (FCC) 7-day rule mandating that telecom providers report data breaches within seven days after initial discovery, underscore the growing urgency to fortify cybersecurity measures across this vital sector. Research from Sysdig’s Threat Research Team revealed the telecom industry was the most…

Read More

Reducing RPA security risk

Reducing RPA security risk

Reducing RPA security risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Faith Roy named Deputy CISO at US Department of Veterans Affairs

Faith Roy named Deputy CISO at US Department of Veterans Affairs

Faith Roy named Deputy CISO at US Department of Veterans Affairs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Samsung confirms data breach affecting source code

Samsung confirms data breach affecting source code

Samsung confirms data breach affecting source code | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Listen to Karen Worstell, Senior Cybersecurity Strategist at VMware, talk eliminating cyber vulnerabilities and burnout

Listen to Karen Worstell, Senior Cybersecurity Strategist at VMware, talk eliminating cyber vulnerabilities and burnout

Listen to Karen Worstell, Senior Cybersecurity Strategist at VMware, talk eliminating cyber vulnerabilities and burnout | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Novel RAT attacks global aerospace and telecommunications firms

Novel RAT attacks global aerospace and telecommunications firms

Novel RAT attacks global aerospace and telecommunications firms This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More