Sponsor

2015/11/19

New Issue: Security

In this issue

IoT Instruments of Death

Cybersecurity Goes Mainstream

Cybersecurity Playbook

Fraud Market Overview

Funded Threats

PBX Fraud Detection

Visibility: The Key to Security

Midas Touch

Pervasive Network Visibility

Tamper-proof Computing

Letter from the Editor

Monthly News Digest

Featured Sponsors

sales@pipelinepub.com

news@pipelinepub.com

(734) 707-4988

www.pipelinepub.com

 

Dear Jim,

Greetings!

In this issue of Pipeline, we discuss the state of network security. We'll discuss PBX fraud detection, funded threats, network visibility, and securing customer behavior. We'll also hear from industry expert Wedge Greene on the added challenges of the Internet of Things when it comes to maintaining security and privacy. In addition, we'll talk about security in places it hasn't always been before: in virtual environments and on individual chips. We'll also crack open our cybersecurity playbook and talk about the latest industry news.

All the best,
Tim Young,
Editor-in-Chief

 

Subscribe

About us

Editorial Opportunities

Marketing Opportunities

Membership Packages

Advertising Placements

 

 

  IoT Noir: Instruments of Death  
 

One Friday on a dark and stormy morning, the young woman entered the clinic procedure room and took the seat that the lab tech directed. She wasn't overtly nervous, but did have a background level of concern. Not so much about her health, but about the inconvenience if an issue was found in her patch micro insulin pump. Not that she expected a problem; yet while the filler cartridges were easy to self-service (she switched hers every Wednesday morning), the bi-annual maintenance was not routine. As the technician logged in the security code and began to read the diagnostic information, she slumped in the chair, dropping her book. The technician looked over ...

» Read the full article…

   
  Cybersecurity Goes Mainstream  
 

I recently read an article online entitled: "Virtualization is Going Mainstream''. The dateline was January 1, 2006. It's a good reminder that while the service provider industry working on deploying virtualized networks, the concepts and technologies themselves are not new. Cybersecurity, specifically securing ...

» Read the full article…

   
  The Cybersecurity Playbook  
 

We know. It's a big scary world. According to PricewaterhouseCoopers' Global State of Information Security Survey 2016, 38% more security incidents were detected in 2015 than in 2014. The theft of intellectual property increased 56% in that same time period, according to the report, which relies on ...

» Read the full article…

   
  Industry Report on Telecom Fraud Management Services, Software & Strategies  
 

The global village has fallen in love with the versatility that telecom industry progress has brought us. Unfortunately, there's a trade-off because communications advances bring with them new fraud and security risks. Take the business PBX. Its ability to redirect phone calls is wonderful for business people ...

» Read the full article…

   
  Funded Threats: The Fuel for Malware Evolution  
 

The threat landscape is ever evolving, as our adversaries discover new ways of compromising systems. The monetization of hacking has had a drastic impact on the threat landscape. Today it is easier than ever for an adversary to monetize their nefarious activities. A couple of clear examples exist in Angler Exploit Kit and one of its favorite payloads, ransomware. While threats like ransomware are steadily increasing due to increased profit and stealth, more traditional threats still exist for threat actors that ...

» Read the full article…

   
  PBX Fraud Detection  
 

Your telecom costs were already too big for your burgeoning business, but being slapped with a $20,000 bill because you weren't paying attention to abuse of your own telecom infrastructure hurts your profit margins even more. How did they do that and how do you stop it? As the world increasingly moves toward ...

» Read the full article…

   
  Knowing is Half the Battle: Visibility is the Key to Security  
 

Enterprises are investing more than ever in security technology as a result of increased awareness of vulnerabilities, media coverage of attacks with financial impact, hacktivism, and the consumerization of IT. Most companies have made significant investments in network security technologies and tools over the past decade. It's an executive-level topic. According to the Identity Theft Resource Center, breaches have grown almost 28% from 2013 to 2014, with further increases expected in 2015. So, what is the confidence level in your current network security? Whether you know it or not, your network is probably exposed. For instance, the data in the Verizon 2014 DBIR suggested that ...

» Read the full article…

   
  Midas Touch: Turning Customer Trigger Points into Engagement and Monetization Gold  
 

In an age when communication service providers (CSPs) are faced with cut-throat competition, ballooning network data usage and declining revenues, operators are being forced to find new avenues and strategies that can be leveraged to "up the ante". When it comes to delivering business and consumer network customers an unforgettable experience, one of the most ...

» Read the full article…

   
  SDN-driven telco networks call for pervasive network visibility  
 

It's no secret that the telecommunications market is in the midst of a significant transformation. The number of mobile devices and users has skyrocketed in recent years; according to research by GSMA, there were 3.6 billion unique mobile subscribers at the end of 2014. Half of the world's population now has a mobile subscription — up from just one in five just ...

» Read the full article…

   
  Tamper-proof Computing  
 

Ask the vast majority of information technology professionals today if it is possible to completely secure a computing system against cybercrime and the answer you will get is a resounding "no.'' Through a series of events too long and convoluted to address in this article, we have established a global computing infrastructure that is fundamentally incapable of protecting itself, creating both a playground and ...

» Read the full article…

   
  Letter from the Editor: November 2015  
 

"It must be, I thought, one of the race's most persistent and comforting hallucinations to trust that 'it can't happen here' -- that one's own time and place is beyond cataclysm.'' The Day of the Triffids. John Wyndham. For those of you unfamiliar with Wyndham's 1951 sci-fi classic, the cataclysm in question is ...

» Read the full article…

   
  Monthly News Digest  
 

In mobile innovation news, LG announced the LG Watch Urbane 2nd Edition LTE, the first Android Wear smartwatch to feature cellular connectivity, will begin rolling out to customers worldwide starting this month in the United States and Korea. The watch is available in the US online via AT&T and Verizon for pre-orders; and key markets in Europe, Asia, and the Commonwealth of Independent States is planned ...

» Read the full article…

   

Pipeline Publishing, L.L.C. | www.pipelinepub.com | Ann Arbor | MI | 48103-6938


Forward email


This email was sent to ignoble.experiment@arconati.us by oss@pipelinepub.com |  

Pipeline Publishing, L.L.C. | 2232 South Main Street, #546 | Ann Arbor | MI | 48103-6938

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts (Last 7 Days)