article thumbnail

How Telcos Can Ready Their IT Infrastructures for Telco (Services) Act Compliance

Pure Storage

How Telcos Can Ready Their IT Infrastructures for Telco (Services) Act Compliance by Pure Storage Blog The telecommunications landscape is continually evolving, and with this evolution comes the need for updated regulations and security measures. One of these new regulations is the UK’s Telecommunications Security Framework.

article thumbnail

Risk Management as a Career: A Guide for BCM Professionals

MHA Consulting

They include process and procedural robustness and integrity; people, skills, and training; insurance and self-insurance; the supply chain, outsourcing, and inherent risk; infrastructure, systems, and telecommunications; and physical and information security. Knowledge of how to mitigate risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Telecom Networks Are Challenged by Ransomware Attacks 

Pure Storage

As security firm CrowdStrike noted, this group had expertise with “telecommunications-specific systems … such as External DNS (eDNS) servers, Service Delivery Platform (SDP) systems, and SIM/IMEI provisioning, as well as Operations Support Systems (OSS), and Operation and Maintenance Units (OMU).”¹. 1] [link]. [2] 2] [link].

article thumbnail

Increase Community Resilience for Extreme Cold Emergencies

CCEM Strategies

During extreme cold events, people in rural communities may experience increased difficulty in accessing services such as healthcare, emergency shelters, and reliable critical infrastructure like telecommunication, transportation, and day-to-day supply chains (food, fuel, imported goods).

article thumbnail

Congress Sends NDAA FY23 to Biden’s Desk, Adds Semiconductor Procurement Restrictions

Security Industry Association

A critical system is a national security system, a telecommunications or information system operated by the Federal Government involved in: intelligence activities; cryptologic activities; command and control of military forces; weapon or weapon systems; or the direct fulfillment of military intelligence missions.

article thumbnail

IntelligentSIA: 12 Ways to Get Involved With SIA This Month

Security Industry Association

Congress recently passed the Secure Equipment Act, which would require the Federal Communications Commission to limit new authorizations for certain Chinese telecommunications and security equipment. Join us to enjoy complimentary breakfast and get tips and insights on how to present like a pro.

article thumbnail

Resiliency Is Top Priority in 2023 White House Cybersecurity Strategy

Pure Storage

Defend critical infrastructure In addition to modernizing its own systems, the government is working to mitigate widespread disruptions that can occur when critical infrastructures are taken out at the knees. As you review the key objectives and recommendations, ask yourself: Is my security architecture resilient?