article thumbnail

U.S. House Passes Bill to Requiring FCC to Limit New Authorizations for Chinese Equipment, Prohibit Revocation

Security Industry Association

would require the Federal Communications Commission (FCC) to adopt rules prohibiting “equipment authorization” for certain Chinese telecommunications and video surveillance equipment. 19, the FCC had published a proposed rule that would prohibit new authorizations for equipment considered part of the FCC’s “Covered List.”

article thumbnail

Don't let cybersecurity frameworks scare you, you're already working towards compliance

Scott R. Davis

Factor in the cost for a business to certify within a framework and then you rarely will find leadership buy-in, and let’s be honest that money is often better served elsewhere in a tight budget.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Book Review: Justice, Equity, and Emergency Management

Recovery Diva

Review by Donald Watson, co-author with Michele Adams of Design for Flooding: Resilience to Climate Change (Wiley 2011). More than twenty authors are represented in this timely book, edited by Alessandra Jerolleman and William L. He has since served in over thirty nations worldwide as consultant for United Nations, U.S.

article thumbnail

SIA New Member Profile: Morningstar Corporation

Security Industry Association

Morningstar charging technology is eminently suitable and flexible for power over ethernet, internet protocol video, Internet of Things devices, pan/tilt/zoom cameras and all the other tools comprising the portfolios of today’s security professionals.

article thumbnail

How an MSP protects a business’s VoIP systems

Online Computers

A Voice over Internet Protocol (VoIP) system is a set of technologies that allow for voice and multimedia communications to be sent over the internet. By implementing strong access controls for the client's VoIP system, an MSP can ensure that only authorized users can access protected data or sensitive information.

article thumbnail

How to Generate a CSR

Pure Storage

How to Generate a CSR by Pure Storage Blog To provide encrypted traffic using SSL/TLS between a client and a host server, companies must create a certificate signing request (CSR) and submit it to a certificate authority (CA). When you decide to implement HTTPS on your website, you need an SSL/TLS certificate from a certificate authority.

article thumbnail

How Telcos Can Ready Their IT Infrastructures for Telco (Services) Act Compliance

Pure Storage

The TSA affects all telecommunications companies operating in the UK, including traditional telecom operators, mobile network providers, internet service providers, and other entities that significantly deliver telecommunications services. Security of customer data: Protecting customer data is of paramount importance.