
Evil Corp identified as the threat actor behind ransomware attacks on Sinclair and Olympus. Privateering. Fin7’s front company. Sentencing in a bulletproof hosting case.
CyberWire Daily
00:00
5G and Zero Trust - The Four Steps to Implementation
Five g technology could increase the attack surface for malicious actors by introducing new vulnerabilities and expanding the number of potential targets. To operate through existing five g infra structure world wide, the d o d will need to overcome significant security vulnerabilities that adver ries could exploit on a global scale. So where's a good place to start here meana how to organizations get going? We look at four steps to realize zero trust, for five g and the adoption of the pillars around zero trust.
Play episode from 20:50
Transcript


