Tag Archives: Critical Infrastructure

  1. Supply Chain of Trust Broken | What the Ribbon Communications Breach Tells Us About Identity at the Network Layer

    Modern supply chains run on trust. In cybersecurity, trust is often our greatest exposure. The recent Ribbon Communications breach, reportedly the work of a nation-state actor operating undetected for nearly a year, highlights a pattern we’ve seen before with Salt Typhoon: patient, credential-driven infiltration of telecom and infrastructure ecosystems. These aren’t just data breaches. They…

  2. From AAA to Assurance: How the UK Telecoms Security Act Is Shaping Identity-Based Network Control

    Introduction As CISOs, we often face regulations that seem far removed from the practical realities of running identity and access infrastructure. The UK’s Telecommunications Security Act (TSA) and its accompanying Code of Practice mark a significant shift in that dynamic. Identity and privileged access management are no longer back-office hygiene tasks; they are front-line compliance…

Background

READY TO MAKE AN IMPACT?

Let's work together to help everyone become more secure.