The expanding cybersecurity threat surface: Emerging threats for telcos
As well as dealing with known threats, service providers must be constantly vigilant against emerging and, as yet, unknown cybersecurity threats across an expanded threat surface. Automation is key to meeting this challenge. Cybersecurity has always been a game of ‘cat and mouse’ between organisations (and consumers), and their adversaries. However, in recent years – […]
How can you deal with cybersecurity threats to network slicing and the USRP?
5G Standalone (SA), and, specifically, the dynamic network slicing it offers, will provide multiple benefits to communications service providers (CSPs), offering new market opportunities and revenue streams. But, at the same time, dynamic network slicing represents a significantly expanded cyberattack threat surface with multiple attack opportunities for malicious actors. 5G SA offers multiple use cases […]
The expanded threat surface: IoT-connected devices
Smart homes represent a growing security threat surface for CSPs. Not only do they represent an easy attack vector for hackers, but they are often left vulnerable by consumers that do not know how to secure their smart home. Automation offers a significant solution to these challenges. The proliferation of IoT-connected smart home devices – […]
Interpreting NIS 2 Directive requirements for applying automation
Interpreting the new NIS 2 Directive can be challenging. But once you understand your organisation’s obligations, automation can significantly ease the burden. The NIS 2 Directive was enacted into European Union law on 17th October 2024. It significantly builds on and expands the compliance requirements set out in the original NIS Directive. It requires organisations […]
Automation Simplifies Cybersecurity and Compliance
Automation can not only help build a holistic, joined-up approach to cybersecurity within a rapidly expanding threat surface, it can also help you to meet the ever-growing range of compliance obligations. In September this year, 19 major railway stations across the UK were attacked by hackers, who gained access to station Wi-Fi control points and presented users […]
Where are you on the compliance journey?
The recent enactment of the European Union’s NIS 2 Directive places a compliance burden on telcos throughout the region – as well as strict reporting requirements. How can automation ensure your compliance? The European Union’s NIS 2 Directive was enacted into law on 17th October 2024 and requires an over-arching, holistic approach to cybersecurity. Siloes […]
Automation: Protecting your organisation against NIS 2 Directive risk scenarios
The NIS 2 Directive outlines 4 risk scenarios for the telecoms sector, highlighting why a holistic approach to cybersecurity is essential. The We Are CORTEX automation platform can enable a cross-domain approach to significantly help you meet your NIS 2 compliance obligations – and derisk your business. The NIS 2 Directive is a European Union […]
How Automation can help evaluate and assess cybersecurity risk to meet NIS 2 Directive obligations
One of the starting points to meet the incoming NIS 2 Directive is to perform a far-reaching risk evaluation and assessment, which can seem like a daunting task. But Automation can take away that perceived burden. The European Union’s NIS 2 Directive, alongside the UK’s Telecoms (Security) Act 2021, is aimed at expanding and strengthening […]
Delivering an enhanced fan experience requires a broad focus – and network and IT automation across multiple fronts
In a recent post, we explored a (somewhat) idealised vision of a fan’s journey and experience at Euro 2024. Everything we discussed is possible today, but, in the main, has yet to be realised. We wanted to show how MNOs could elevate the customer experience. Of course, the tournament has now concluded – well done […]