What will be identified as the primary source of cybersecurity threats to U.S. telecom networks by December 31, 2025?
Chinese government hackers • 25%
Russian government hackers • 25%
Independent cybercriminal groups • 25%
Other • 25%
Reports from U.S. intelligence agencies or official cybersecurity assessments
U.S. House to Vote on $3 Billion Plan to Remove Chinese Telecom Equipment Amid Salt Typhoon Cybersecurity Threat
Dec 10, 2024, 04:27 PM
The U.S. House of Representatives is set to vote on a proposal to allocate $3 billion for the removal of Chinese telecom equipment, amid growing concerns about cybersecurity risks. In parallel, the Federal Communications Commission (FCC) has proposed new cybersecurity rules tied to wiretapping laws, following significant breaches attributed to Chinese government hackers, known as Salt Typhoon. U.S. Senator Ron Wyden has introduced a bill that would mandate the FCC to enforce cybersecurity requirements for telecom companies. The proposed legislation includes measures such as minimum security standards, annual testing and fixes, audits, and reports. These actions aim to bolster the security of American telecom networks in response to recent cyberattacks by Salt Typhoon.
View original story
Advanced firewall systems • 25%
End-to-end encryption • 25%
Other • 25%
AI-based threat detection • 25%
Encrypted Messaging • 25%
Network Segmentation • 25%
Increased Cybersecurity Workforce • 25%
Advanced Threat Detection Systems • 25%
Other • 25%
Russia • 25%
China • 25%
North Korea • 25%
Other entities • 25%
Cybersecurity firms • 25%
Telecom companies • 25%
Government agencies • 25%
Increased cybersecurity investment • 25%
Government collaboration • 25%
Other • 25%
Partnership with cybersecurity firms • 25%
Other company • 25%
T-Mobile • 25%
Verizon • 25%
AT&T • 25%
Network segmentation • 25%
Regular security audits • 25%
Access control improvements • 25%
Enhanced encryption • 25%
No change in breach frequency • 25%
Significant reduction in breaches • 25%
Moderate reduction in breaches • 25%
Increase in breaches • 25%
Phishing • 25%
Supply Chain Attack • 25%
Zero-Day Exploit • 25%
Ransomware • 25%
Verizon • 25%
Other • 25%
T-Mobile • 25%
AT&T • 25%
Yes • 50%
No • 50%
Yes • 50%
No • 50%
Yes • 50%
No • 50%
Postponed • 34%
Approved • 33%
Rejected • 33%