|
|
| | IoT Noir: Instruments of Death | |
| | One Friday on a dark and stormy morning, the young woman entered the clinic procedure room and took the seat that the lab tech directed. She wasn't overtly nervous, but did have a background level of concern. Not so much about her health, but about the inconvenience if an issue was found in her patch micro insulin pump. Not that she expected a problem; yet while the filler cartridges were easy to self-service (she switched hers every Wednesday morning), the bi-annual maintenance was not routine. As the technician logged in the security code and began to read the diagnostic information, she slumped in the chair, dropping her book. The technician looked over ...
» Read the full article… | | | |
|
|
|
| | Cybersecurity Goes Mainstream | |
| | I recently read an article online entitled: "Virtualization is Going Mainstream''. The dateline was January 1, 2006. It's a good reminder that while the service provider industry working on deploying virtualized networks, the concepts and technologies themselves are not new. Cybersecurity, specifically securing ...
» Read the full article… | | | |
|
|
|
| | The Cybersecurity Playbook | |
| | We know. It's a big scary world. According to PricewaterhouseCoopers' Global State of Information Security Survey 2016, 38% more security incidents were detected in 2015 than in 2014. The theft of intellectual property increased 56% in that same time period, according to the report, which relies on ...
» Read the full article… | | | |
|
|
|
| | Industry Report on Telecom Fraud Management Services, Software & Strategies | |
| | The global village has fallen in love with the versatility that telecom industry progress has brought us. Unfortunately, there's a trade-off because communications advances bring with them new fraud and security risks. Take the business PBX. Its ability to redirect phone calls is wonderful for business people ...
» Read the full article… | | | |
|
|
|
| | Funded Threats: The Fuel for Malware Evolution | |
| | The threat landscape is ever evolving, as our adversaries discover new ways of compromising systems. The monetization of hacking has had a drastic impact on the threat landscape. Today it is easier than ever for an adversary to monetize their nefarious activities. A couple of clear examples exist in Angler Exploit Kit and one of its favorite payloads, ransomware. While threats like ransomware are steadily increasing due to increased profit and stealth, more traditional threats still exist for threat actors that ...
» Read the full article… | | | |
|
|
|
| | PBX Fraud Detection | |
| | Your telecom costs were already too big for your burgeoning business, but being slapped with a $20,000 bill because you weren't paying attention to abuse of your own telecom infrastructure hurts your profit margins even more. How did they do that and how do you stop it? As the world increasingly moves toward ...
» Read the full article… | | | |
|
|
|
| | Knowing is Half the Battle: Visibility is the Key to Security | |
| | Enterprises are investing more than ever in security technology as a result of increased awareness of vulnerabilities, media coverage of attacks with financial impact, hacktivism, and the consumerization of IT. Most companies have made significant investments in network security technologies and tools over the past decade. It's an executive-level topic. According to the Identity Theft Resource Center, breaches have grown almost 28% from 2013 to 2014, with further increases expected in 2015. So, what is the confidence level in your current network security? Whether you know it or not, your network is probably exposed. For instance, the data in the Verizon 2014 DBIR suggested that ...
» Read the full article… | | | |
|
|
|
| | Midas Touch: Turning Customer Trigger Points into Engagement and Monetization Gold | |
| | In an age when communication service providers (CSPs) are faced with cut-throat competition, ballooning network data usage and declining revenues, operators are being forced to find new avenues and strategies that can be leveraged to "up the ante". When it comes to delivering business and consumer network customers an unforgettable experience, one of the most ...
» Read the full article… | | | |
|
|
|
| | SDN-driven telco networks call for pervasive network visibility | |
| | It's no secret that the telecommunications market is in the midst of a significant transformation. The number of mobile devices and users has skyrocketed in recent years; according to research by GSMA, there were 3.6 billion unique mobile subscribers at the end of 2014. Half of the world's population now has a mobile subscription up from just one in five just ...
» Read the full article… | | | |
|
|
|
| | Tamper-proof Computing | |
| | Ask the vast majority of information technology professionals today if it is possible to completely secure a computing system against cybercrime and the answer you will get is a resounding "no.'' Through a series of events too long and convoluted to address in this article, we have established a global computing infrastructure that is fundamentally incapable of protecting itself, creating both a playground and ...
» Read the full article… | | | |
|
|
|
| | Letter from the Editor: November 2015 | |
| | "It must be, I thought, one of the race's most persistent and comforting hallucinations to trust that 'it can't happen here' -- that one's own time and place is beyond cataclysm.'' The Day of the Triffids. John Wyndham. For those of you unfamiliar with Wyndham's 1951 sci-fi classic, the cataclysm in question is ...
» Read the full article… | | | |
|
|
|
| | Monthly News Digest | |
| | In mobile innovation news, LG announced the LG Watch Urbane 2nd Edition LTE, the first Android Wear smartwatch to feature cellular connectivity, will begin rolling out to customers worldwide starting this month in the United States and Korea. The watch is available in the US online via AT&T and Verizon for pre-orders; and key markets in Europe, Asia, and the Commonwealth of Independent States is planned ...
» Read the full article… | | | |
|
No comments:
Post a Comment
Keep a civil tongue.