The remote server returned an error: (500) Internal Server Error.

article image

Spotlight

Security Compass

At Security Compass, we have extensive cross industry knowledge, technical prowess, and have developed the right expert tools to predict, plan and prevent a security breach. We guide your team in building a customized security blueprint based on your industry, software development lifecycle, and business needs to cost-effectively mitigate risks. Our team is comprised of experienced experts in information security, who are able to understand your business, and work with you to incorporate security strategies within your existing operating environment.

OTHER ARTICLES

The tool to improve AI transparency has arrived: AI Registers

Article | May 11, 2021

Transparency, explainability and trust are big and pressing topics in AI/ML today. Nobody wants to find themselves at the receiving end of a black AI box system that makes consequential decisions (e.g., about jobs, healthcare, citizenship, etc.), especially if those decision are unfair, biased, or just plainly not in our favor. And most organizations agree that consumer trust and confidence that AI is being used ethically and transparently are key to unlocking its true potential. And while there are literally hundreds of documents describing and prescribing AI principles, frameworks and other good things, last year there was no practical tool that could help with implementing transparency. And this tool is AI registers… The Cities of Helsinki and Amsterdam jointly announce the launch of their public AI registers. The two registers were developed in collaboration with Saidot.ai, a Finnish company which specializes in “bringing transparency to consumer services” and which, to the best of my knowledge, is the only vendor in this space. The idea for the company grew from the personal frustration of its founder and CEO, Meeri Haataja, who was “seeing how important transparency of AI is for the future of each one of us, and not being able to find too many meaningful ways to act on it.”

Read More

GET THE MOST OUT OF YOUR SD-WAN: FEATURES YOU NEED TO START USING TODAY

Article | March 20, 2020

Software-defined wide-area network, also known as SD-WAN, is an implementation of software-defined networking (SDN) technology applied on WAN. This can include WAN connections such as broadband Internet, MPLS, and 4G. One of the most common reasons large businesses use SD-WAN is that it helps them connect their branch offices to centralized datacenters located over large geographical distances. While being very helpful to enterprises in a variety of ways, SD-WAN initially lacked several features such as application-aware routing, integrated firewalls, analytics tools, and more.

Read More

SD-WAN security: The impact of orchestrated services multiplicity

Article | February 17, 2020

The pace of software-defined wide-area network (SD-WAN) deployments has experienced strong growth over the past four years. As a result, the SD-WAN has already become a strategic component of many communications service provider (CSP) networks. One reason for SD-WAN growth is that the service richness of SD-WANs continues to evolve, such as with the integration of security services into those deployments. Increasingly, SD-WAN security services are becoming an important differentiator, playing a major role in the managed SD-WAN service provider selection process.

Read More

How 4G and 5G networks are vulnerable to Denial-of-Service attacks

Article | March 26, 2020

Mobile operators are racing to upgrade their networks with 5G connectivity while at the same time expanding 4G LTE coverage throughout the world. Though the latest generations of cellular technology offer faster performance and other benefits over their predecessors, they're vulnerable to some of the same security flaws. A report released Thursday by Positive Technologies explains how and why existing 4G and new 5G networks can be hurt by Denial-of-Service (DOS) attacks in particular. For its report "Security Assessment of Diameter Networks 2020," Positive Technologies simulated external attacks against 28 telecom operators in Europe, Asia, Africa, and South America during 2018 and 2019. Specifically, the company looked at 4G and 5G networks using Diameter signaling protocol, a method for coordinating data among different Internet Protocol (IP) network elements.

Read More

Spotlight

Security Compass

At Security Compass, we have extensive cross industry knowledge, technical prowess, and have developed the right expert tools to predict, plan and prevent a security breach. We guide your team in building a customized security blueprint based on your industry, software development lifecycle, and business needs to cost-effectively mitigate risks. Our team is comprised of experienced experts in information security, who are able to understand your business, and work with you to incorporate security strategies within your existing operating environment.

Events