Self-propagating ransomware: What the WannaCry ransomworm means for you
Many IT professionals were caught by surprise by WannaCry largely because they didn't expect ransomware to spread across their networks on its own.
Throwing our IoT investment in the trash thanks to NetGear
Discontinuation of the NetGear cloud service sends the company's VueZone wireless video cameras into the IoT trash.

We need a better Private Browsing Mode
Many web browsers have some variation of Private Browsing Mode. The settings aren't enough, though, to offer real protection.

Dude, where’s my phone? BYOD means enterprise security exposure
You should be worried if an employees loses a smartphone or tablet, especially if that employee accesses any enterprise resources using that device.

Open source networking: The time is now
We are never going back to proprietary networks. Today’s world is all about open—from APIs to partnerships to end-to-end orchestrated services.

Fight corporate data loss with secure, easy-to-use collaboration tools
You can’t protect vital corporate communications and data if employees can use shadow IT to circumvent compliance policies. Instead, you need better collaboration software.

IoT at MWC: We need secure network infrastructure – not shiny rings – to keep us safe
Wearables, sensors, batteries, cool apps, great wristbands – sure, those are key to IoT success, but the real trick is to provision reliable, secure and private communications that even Black Riders and hordes of nasty Orcs can’t...

Subdermal wearables could unlock real possibilities for enterprise IoT
Wave your hand to access a computer terminal, or touch a power screwdriver to prove that you are authorized to use it, thanks to bodyhacking.
The IoT calls for an AI-based security approach
How new cybersecurity technology can help protect us from the inherent threats in the Internet of Things.
Secure, compliant messaging is more than just encrypting the messages
We often talk about BYOD. We should be equally concerned about BYOM – that is, bring your own messaging platform. Who knows what types of official and unofficial business correspondence is being done via Facebook Messenger, Twitter...

How pumped up is your pumped-up cloud data center?
A cloud data center is supposed to scale sky-high — but few know the actual capacity. How many virtual machines can it host, and how will the cloud perform as CPU, storage, networking and I/O utilization climb higher and higher? Those...
For carriers, OSS can become a competitive advantage, not a cost center
Operations Support Systems excel in managing traditional networks, but they can be more, so much more, as we look forward to smarter networks that are more responsive to enterprise customer needs.

4 steps to make DevOps safe, secure, and reliable
Fast application deployment may seem at odds with robust security practices, which often take a go-slow approach to new or changed applications in order to verify that the applications are safe before letting them touch live data or...

ISP opportunity: Protect the Internet of Things in the home
Consumer ISPs have a unique role to play in sanitizing and protecting the home from rogue attempts to subvert IoT devices.
Orchestration means more than rapid provisioning of carrier services
Service orchestration is important, but there's a lot more to it than being able to allow customers to quickly self-provision connections and bandwidth. Orchestration also means being able to rapidly detect and resolve connection...

Can you answer these 4 questions about your network security policies?
Network security doesn't have to be expensive, and it doesn't have to be complicated. Fancy new technologies won’t help if you're not focusing on the roots of good cybersecurity. Let's talk about some of the most important questions...
Yes, Virginia, NFV services can be testable, scalable and predictable
A year is a long time in this business, and it's great that NFV software embedded in a software-defined network has moved from 'by golly, it works!' proof-of-concept to a hard-driving test that shows reliable performance under load.

Inside AZ Labs, a facility 'certified at the highest level' of cybersecurity
AZ Labs, or Arizona Laboratories for Security & Defense Research, is a cyberfortress. Literally. Like something out of a Cold War drama, the four-building campus is "certified at the highest level" of security.
Forget SDN and NFV: It's all about LSO
Lifecycle Service Orchestration is a catchphrase that embraces the range of activities performed by a telco or other communications service provider. An LSO platform would handle everything from provisioning the customer order to...
Top Blog Posts