SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

What We Need to Do in the Fight against IoT Fraud and Identity Theft

By: Rui Paiva

Within just two years, it is expected that there will be four connected ‚Äėthings‚Äô for every person on the planet. The growth of the Internet of Things (IoT) means more convenience and opportunity for more people, but it comes at a cost. With so many Internet-connected devices in every home and business, the IoT is a vast playground for fraudsters‚ÄĒand it‚Äôs growing larger every day. Some 15.4 million consumers were victims of identity theft or fraud in 2017, according to Javelin Strategy & Research‚Ķ

¬Ľ read this article

How Operators can Avoid Blockchain's Pitfalls

By: Jitendra Thethi

The telecoms industry‚ÄĒperhaps more than any other‚ÄĒis in the midst of a seismic disruption, the likes of which have never been seen before. The rise in OTT service providers has eroded operators‚Äô traditional voice and messaging revenues, while an increasingly virtualized ecosystem and the imminent arrival of 5G and the IoT all present operators with as many potential challenges as lucrative opportunities. Under these circumstances, it‚Äôs perhaps unsurprising that a small but growing number of operators are turning to blockchain as a means of digitizing their business processes‚Ķ

¬Ľ read this article

Cyberthreats that operators' customers will be facing during the holidays

By: Itay Yanovski

As consumers forsake the mall in favor of Internet shopping, retailers are becoming increasingly reliant on their telecom providers to maintain their growing online footprint. But as the shopping season approaches, online retailing‚Äôs growth is threatened by a seasonal tsunami of cybercrime. With cyberattacks on online retailers‚ÄĒincluding those who also maintain a brick and mortar presence‚ÄĒroughly doubling every year, retailers should be doing all they can to protect their customers as never before‚Ķ

¬Ľ read this article

Advanced Analytics to Combat Robocalling

By: Paul Florack

The Federal Trade Commission (FTC) received 4.5 million robocall complaints in 2017, up from 3.4 million the prior year. This significant increase helps to explain why the robocall epidemic is squarely in the crosshairs of wireless and wireline operators, regulators and legislators, technology vendors, and, of course, consumers. The FTC and Federal Communications Commission (FCC) have been working with the telecommunications industry to encourage solutions to stop robocalls for several years. Illegal spoofed robocalls, where the caller name and telephone number is faked in order to deceive the call recipient, have drawn particular attention…

¬Ľ read this article

Data Breach Emulation Raises the Bar

By: David DeSanto

Your network is under siege. Both the nature of the Internet and hackers’ use of automated tools mean that attacks occur around the clock. To ensure that the tools and policies you have in place are sufficient to protect your network and data, you need to continuously assess, validate, and identify any potential weaknesses, so you can address them before they can be exploited. Not all assessment methods are created equal, however. There is a critical difference between methods that rely on emulation and methods that rely on simulation, and data breach emulation methods provide a more accurate assessment of your security posture Evolving Threat Landscape There is no such thing as an impenetrable network or invulnerable security…

¬Ľ read this article

How to Attack-Proof Backup Data Against Ransomware

By: Eran Farajun

The most widely used approach used by businesses to recover from ransomware attacks has been to recover the criminally encrypted data from the backup set. This has provided a very successful workaround to paying the demanded ransom. Success in recovering ransomware encrypted data from the backup has reduced the profits of hacker revenue streams and, as a result, ransomware designers have evolved these attacks to not only target primary but also secondary (backup) data as well. One of the most aggressive strategies by ransomware developers for targeting backup data has been the attack-loop…

¬Ľ read this article

Proactive Network Issue Resolution is the Key to a Great Customer Experience

By: Wojciech Dziunikowski

The telecommunications landscape is becoming increasingly competitive, forcing CSPs to find ways of improving their market position. Originating mainly from the IT world, OTT players are the main opponents, with light, easy-to-use mobile applications from companies such as Facebook, Uber and Spotify forcing customers to interact constantly with the service provider. Because they provide access to the network powering the circulatory system of today’s economy, however, telecoms companies are well positioned to compete with OTT providers in the realm of customer experience…

¬Ľ read this article

Going Underground for Data Center Assurance and Security

By: Todd Murren

We exist in a world today that has witnessed more transformation in the last decade than over this past century. Knowledgeable systems digitally driven by powerful and innovative platforms and next-gen technologies like distributed cloud, Artificial Intelligence (AI) and the all-encompassing Internet of Things (IoT) make up only a partial list. This relentless appetite for innovation and evolution creates a pace for advancement that can present both challenges and opportunities for that measurement called “success…

¬Ľ read this article

IoT Security: Down to Fundamental and Up to C-Level

By: Erez Kreiner

Cybersecurity has become a major factor in the risk calculation of almost any company, no matter if it is a large enterprise or small home business. Various solutions are offered by many vendors to overcome the security gaps in companies‚Äô networks and devices, and a lot of effort is invested in searching for the ‚Äúholy grail‚ÄĚ of security, the one that will supply a fully protected environment for all devices. As we all know, this search will probably last forever, as hackers become more sophisticated and rogue nations pool their resources to maliciously attack the larger global community and economy‚Ķ

¬Ľ read this article

Letter from the Editor - November 2018

By: Scott St. John

There is a war being waged and you are at the center of it. There is an army of bad actors armed with billions of connected devices executing precise operations with sophisticated weapons aimed at you, your loved ones, your company, and even your country. These malfeasants are seeking to destroy, pillage, and profit at your expense - and they are winning.You might think I'm being a bit over dramatic but, unfortunately, I'm not.An entire market has been dedicated to weaponizing software, which can be bought off the shelf and even comes with call center support…

¬Ľ read this article

Telecom Industry News

By: Scott St. John

October brimmed with fascinating news and developments. Network evolution in the skies will provide gate-to-gate connectivity for portions of the Air France fleet, thanks to a new partnership between Global Eagle and Orange Business Services. The 2018 INCOMPAS Show is set to kick off at month’s end, with a keynote panel focused on the bandwidth revolution and fiber’s key role on the road to 5G. Cybersecurity concerns should remain top priorities, according to new findings from Vodafone on readiness and business outcomes…

¬Ľ read this article
FEATURED SPOTLIGHT

Latest Updates





Subscribe to our YouTube Channel