Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceSecurity Education & Training

CISA’s communications guidance: A wake-up call for all industries

By Phil Lewis
Woman holding alarm clock

Malvestida via Unsplash

February 5, 2025

In late 2024, it became clear that the intensity of state sponsored attacks on the network infrastructure critical to both public and private organizations has reached unprecedented levels, with potentially extreme consequences. Earlier in the July, CrowdStrike exposed how even minor, innocent errors can lead to major disruption. So it is no real surprise that by the end of December, following the discovery of the Salt Typhoon compromise, that the then White House Deputy National Security Advisor for Cyber, Anne Neuberger, announced that the United States would follow the United Kingdom and Australia in implementing enhanced security and resilience regulations. These regulations recognize the critical role of the telecommunications sector, noting “the nation’s secrets and the nation’s economy” depend upon it.  

Throughout December and into January, the U.S. government agencies and Communications Service Providers (CSPs) were working urgently to address the Salt Typhoon attacks which compromised major telco networks. However, the threat extends beyond telcos to all organizations — and in many cases the groundwork may already be in place. Anne Neuberger underscored this urgency by naming the critical steps organizations must implement, including improving configuration management for network devices and enhancing vulnerability management. These measures are no longer optional — they are essential. 

Calls for urgent change: Defending against heightened threats

The stakes could not be higher. Volt and Salt Typhoon attacks date back as far as 2022, even though they were only recently discovered. This means state-sponsored threat groups have had the potential, at any time, to control Critical National Infrastructure networks and extract sensitive data, including information from health and financial sectors. As a result, for the first time in a decade, new rules for protecting healthcare data are also being introduced across the U.S.

Beyond this, Salt Typhoon highlights the deep threat of intellectual property theft affecting industries from aerospace to media and entertainment, along with the surge in ransomware and extortion threats that is impacting these sectors too.

Moving forward: Leveraging new guidance

In response to these escalating threats, the Cybersecurity and Infrastructure Security Agency (CISA), alongside the NSA, FBI and their Five Eyes counterparts has issued guidance for telecommunications infrastructure defenders. The guidance emphasizes five key areas: network visibility, access control, segmentation, change detection and configuration management. These principles are critical not just for CSPs but for any organization with on-premise enterprise equipment. 

Enhancing operational resilience: Four key practices

Aligned with CISA’s guidance, the following four actionable steps are foundational for strengthening defenses and building organizational resilience and recoverability. 

Segment networks to contain breaches

Network Segmentation — both macro and micro — is a proven strategy to prevent or delay attackers from moving laterally within a system. Begin by identifying critical systems and data, isolating them from enterprise IT networks using least privilege access. Enforce segmentation by monitoring all network and user change against approved whitelists and flagging anomalies in traffic. Effective segmentation can mean the difference between a manageable incident and a catastrophic failure.

Achieve full network visibility to identify anomalies

Without a comprehensive view of your network’s architecture, configurations, access controls and activity, defending it is nearly impossible. Continuous visibility allows organizations to establish baselines, differentiate between planned and unplanned changes, and quickly identify anomalies or indicators of compromise.

Assess risk exposure to known industry attacks

Organizations must understand and monitor their exposure to known attack vectors specific to their organization or industry. Continuously assess and prioritize vulnerabilities — whether configuration or software — based on their relevance to these attack vectors. Focus remediation efforts on the most critical risks to reduce the attack surface effectively.  Advanced risk exposure monitoring solutions are essential for achieving this. 

Maintain accurate CMDBs to aid business continuity and disaster recovery

Relying on network devices themselves as the ‘source of truth’ for their configurations introduces significant risk — especially in disaster recovery scenarios. Accurate, up-to-date Configuration Management Databases (CMDBs) are critical for roll-back and recovery, root cause analysis and business process improvement. Automating CMDB updates ensures all changes — planned or unauthorized — are documented, enabling swift recovery and preventing new exposure risks. 

Maintaining economic security and prosperity: Network readiness, resilience & recoverability

By implementing these practices, organizations can improve their network readiness, resilience and recoverability. These measures not only safeguard critical systems and data but also enable CSPs and other CNI providers to fulfil their role in maintaining national security and economic prosperity. 

KEYWORDS: communications security operational resilience threat landscape threat mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Phil lewis headshot

Phil Lewis is SVP, Market Strategy & Development at Titania. Image courtesy of Lewis

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-security-freepik1170x658x9.jpg

    Log4Shell a huge wake-up call for 95% of security leaders

    See More
  • Business Continuity Plan

    Your Mid-Year BCP Wake-Up Call: Is Your Business Ready?

    See More
  • data_security_-_blog_-768x423

    EDPB issues guidance for cross-border data transfers in wake of Schrems II judgment

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing