Self-propagating ransomware: What the WannaCry ransomworm means for you

Self-propagating ransomware: What the WannaCry ransomworm means for you

Many IT professionals were caught by surprise by WannaCry largely because they didn't expect ransomware to spread across their networks on its own.

05/16/17

Throwing our IoT investment in the trash thanks to NetGear

Throwing our IoT investment in the trash thanks to NetGear

Discontinuation of the NetGear cloud service sends the company's VueZone wireless video cameras into the IoT trash.

07/11/16

We need a better Private Browsing Mode

We need a better Private Browsing Mode

Many web browsers have some variation of Private Browsing Mode. The settings aren't enough, though, to offer real protection.

07/08/16

Dude, where’s my phone? BYOD means enterprise security exposure

Dude, where’s my phone? BYOD means enterprise security exposure

You should be worried if an employees loses a smartphone or tablet, especially if that employee accesses any enterprise resources using that device.

06/20/16

Open source networking: The time is now

Open source networking: The time is now

We are never going back to proprietary networks. Today’s world is all about open—from APIs to partnerships to end-to-end orchestrated services.

06/06/16

Fight corporate data loss with secure, easy-to-use collaboration tools

Fight corporate data loss with secure, easy-to-use collaboration tools

You can’t protect vital corporate communications and data if employees can use shadow IT to circumvent compliance policies. Instead, you need better collaboration software.

04/25/16

IoT at MWC: We need secure network infrastructure – not shiny rings – to  keep us safe

IoT at MWC: We need secure network infrastructure – not shiny rings – to keep us safe

Wearables, sensors, batteries, cool apps, great wristbands – sure, those are key to IoT success, but the real trick is to provision reliable, secure and private communications that even Black Riders and hordes of nasty Orcs can’t...

02/26/16

Subdermal wearables could unlock real possibilities for enterprise IoT

Subdermal wearables could unlock real possibilities for enterprise IoT

Wave your hand to access a computer terminal, or touch a power screwdriver to prove that you are authorized to use it, thanks to bodyhacking.

01/20/16

The IoT calls for an AI-based security approach

The IoT calls for an AI-based security approach

How new cybersecurity technology can help protect us from the inherent threats in the Internet of Things.

12/14/15

Secure, compliant messaging is more than just encrypting the messages

Secure, compliant messaging is more than just encrypting the messages

We often talk about BYOD. We should be equally concerned about BYOM – that is, bring your own messaging platform. Who knows what types of official and unofficial business correspondence is being done via Facebook Messenger, Twitter...

10/20/15

How pumped up is your pumped-up cloud data center?

How pumped up is your pumped-up cloud data center?

A cloud data center is supposed to scale sky-high — but few know the actual capacity. How many virtual machines can it host, and how will the cloud perform as CPU, storage, networking and I/O utilization climb higher and higher? Those...

09/16/15

For carriers, OSS can become a competitive advantage, not a cost center

For carriers, OSS can become a competitive advantage, not a cost center

Operations Support Systems excel in managing traditional networks, but they can be more, so much more, as we look forward to smarter networks that are more responsive to enterprise customer needs.

08/20/15

4 steps to make DevOps safe, secure, and reliable

4 steps to make DevOps safe, secure, and reliable

Fast application deployment may seem at odds with robust security practices, which often take a go-slow approach to new or changed applications in order to verify that the applications are safe before letting them touch live data or...

07/23/15

ISP opportunity: Protect the Internet of Things in the home

ISP opportunity: Protect the Internet of Things in the home

Consumer ISPs have a unique role to play in sanitizing and protecting the home from rogue attempts to subvert IoT devices.

06/23/15

Orchestration means more than rapid provisioning of carrier services

Orchestration means more than rapid provisioning of carrier services

Service orchestration is important, but there's a lot more to it than being able to allow customers to quickly self-provision connections and bandwidth. Orchestration also means being able to rapidly detect and resolve connection...

06/10/15

Can you answer these 4 questions about your network security policies?

Can you answer these 4 questions about your network security policies?

Network security doesn't have to be expensive, and it doesn't have to be complicated. Fancy new technologies won’t help if you're not focusing on the roots of good cybersecurity. Let's talk about some of the most important questions...

05/26/15

Yes, Virginia, NFV services can be testable, scalable and predictable

Yes, Virginia, NFV services can be testable, scalable and predictable

A year is a long time in this business, and it's great that NFV software embedded in a software-defined network has moved from 'by golly, it works!' proof-of-concept to a hard-driving test that shows reliable performance under load.

04/28/15

Inside AZ Labs, a facility 'certified at the highest level' of cybersecurity

Inside AZ Labs, a facility 'certified at the highest level' of cybersecurity

AZ Labs, or Arizona Laboratories for Security & Defense Research, is a cyberfortress. Literally. Like something out of a Cold War drama, the four-building campus is "certified at the highest level" of security.

04/15/15

Forget SDN and NFV: It's all about LSO

Forget SDN and NFV: It's all about LSO

Lifecycle Service Orchestration is a catchphrase that embraces the range of activities performed by a telco or other communications service provider. An LSO platform would handle everything from provisioning the customer order to...

04/07/15

Load More