WiFi, BYOD and Security: Where are the Devices, and Where are the Users?

"Today's businesses need to secure the user reliably, and securely, in an environment where BYOD is replacing company issued computing.

Location-based information can add a valuable extra level of information to security teams too, but how do businesses balance the demands for ubiquitous access to the network – from any place and any device – with robust security?"
Watch Now


Area 51 is one of the most secure facilities in the world. While it has acres of land surrounding the base, a perimeter fence, keycard, door locks, biometric scanners, and multiple alarms—none of these features individually keeps Area 51 safe.


New Webinar Series Addresses Cybersecurity

Following the release of the National Institute for Standards and Technology (NIST) Cybersecurity Risk Management Framework and a year-long effort by 100 cybersecurity professionals in the broadcast, cable, wireline, wireless and satellite industries to adapt the work to the telecom industry, companies are now poised to consider the best ways to evaluate or implement a cyber risk management program.To advance these efforts, U.S. Telecom is launching a three-part webinar series designed for policy and operational professionals responsible for protecting their networks and customers from cyber threats. The series, scheduled to run May 28, June 18 and July 23, represents an ongoing commitment by industry to enhance capabilities across the sector and broader ecosystem.The May 28 webinar, Telecom Cyber Frameworks, Policies and Business Processes, will examine the core of the NIST framework and how the risk management approach may be applied to an organization. Featured presenters include Jeff Goldthorp with the Federal Communications Commission and Adam Sedgewick from NIST. The June 18 presentation, Telecom Cyber Risk Management, Operational & Technology Requirements will be the first of two sessions focusing on the operational and technology requirements for implementing the framework, including mechanisms for continuous evaluation and improvement. It will also illustrate how companies can create profiles of their current and future risk management capabilities, and prioritize their risk management initiatives.

Have you been affected by the cyber attack?


PowerON recently shared a blog ‘WannaCry NHSCyberAttack and what can be done to prevent or mitigate’ where Steve Beaumont discusses how the attack could have been avoided (hindsight is a wonderful thing) and the Microsoft solutions available to help eliminate future risks. For those interested to learn more, watch Steve Beaumont, PowerON’s Product Development Director, deliver a webinar demonstratiing how you can protect your organisation from future attacks as well as resuming services following an attack. The webinar also explores the free tools and services available as well as quick fixes for the immediate and long term.

CA Part 4: Security Challenges in a SaaS-First Era & Why Identity Matters

The broad range of modern business SaaS apps available today enable employees to be more productive and collaborative than ever before, while allowing them to work anytime, anywhere and on the devices of their choice. However, the proliferation of SaaS apps and a “bring your own app” trend in the workplace has introduced risks and challenges when it comes to securing and managing access to apps across organizational silos. Join CA Technologies and (ISC)2 on December 10, 2015 at 1:00PM Eastern as we dive into the security, agility and user experience challenges associated with the rise of SaaS adoption, and how leveraging identity-centric security can help you unlock the potential of your organization’s SaaS investments.

Changes to the SSL Encryption Guidelines


"There have been recent changes to the guidelines for the use of SSL Encryption by the Certification Authority/Browser (CAB) Forum, and these changes likely affect the types of certificates used and the security of your network. During this webinar you'll learn how the CAB Forum issued guidelines affect your business and the issuance of SSL certificates, changes associated with the issuance of certificates and risks and vulnerabilities from failure to comply with the guideline changes. Join Brian Trzupek, Vice President of SSL Managed Identity at Trustwave, as he discusses these changes and their potential long-term implications."