By: Tim Young
Getting a solid grip on the true scale of the economic cost of cyber-crime is no simple task. Hackers don’t tend to put out press releases about how much they stole, and the scale of the losses
are often difficult for the victims to estimate. In fact, a surprising proportion of internet breaches are ongoing and, as you read this, a hacker may be digging through some other corner of your
network, siphoning sensitive information and pocketing cash. Furthermore, if you’re like many companies or governments, the last thing you plan to do is report those breaches for fear of appearing
vulnerable…
» read this article
By: Alec Main
When it comes to consumer privacy, there are two types of mobile Internet user: 1) those who are nervous about it, and 2) those who know that they should be nervous about it. Wait, what?
The mobile Internet is an amazing place full of conveniences not afforded to the hard-wired desktop. With the power of a mobile device, users have location-based services that offer up ready-access
to restaurants, gas prices, weather reports, shopping deals and more. Geo-tagging of photos that you take so that you can retrace and recall your summer vacation…
» read this article
By: Nancee Ruzicka
Research recently presented by Ericsson indicates that by the end of 2019 it is predicted there will be more than 9 billion mobile subscriptions and that greater than 80% of those subscriptions
will be for mobile broadband (i.e. data) services. And that doesn’t include estimates for M2M and other connected devices. As the number of smart phones and connected devices soars, service
providers become increasingly vulnerable to hacks and data breaches resulting from compromised devices and applications in customers’ hands and homes…
» read this article
By: Jesse Cryderman
Hacking and identity theft has become a part of daily life, just like catching a cold or getting a flat tire. It’s one of those annoyances that we’ve come to accept as part of modern life. It
wasn’t always that way, however. Prior to our ubiquitous, high-speed networks, hacking was relegated to geek-speak and movie scripts. Today, however, a data intrusion is just as likely to be pulled
off by a financially motivated criminal organization as it is a “script kiddy” operating out of his parent’s basement…
» read this article
By: Aleksey Abramovich
According to the Ponemon Institute, on average, one denial-of-service (DoS) attack costs the owner of a website, including those associated with telecom organizations, more than 166 thousand
dollars. Every year, DoS attacks are becoming more expensive as site owners increasingly intensify protection against them. But who is implementing these DoS attacks and for what reason? And what
is the best way to be prepared to protect your website? The Birth of DoS Attacks The first DoS attack was registered in September 1996…
» read this article
By: Jesse Cryderman
Network virtualization is the hottest innovation to occur in the telecom space since wireless itself; perhaps even more so because it alters our communication framework on such a fundamental
level. Some who have been in the telecom space much longer might disagree, but I contend that we are in the process of completely changing the fabric of networking itself, and it is
revolutionary. Virtualization is changing the way vendors and service providers envision their respective future. And it’s moving faster every day…
» read this article
By: Jesse Cryderman
There was a time when many businesses felt safe from cybercrime. As the number of high-profile hacking incidents continue to grow, that time has passed. Today, every business is a target. In
fact, according to Jeffery Guy, a former cyber security expert for the U.S. Air Force, 70 percent of all cyber attacks are waged against small businesses. There is no way to avoid being a target,
but there may be ways to avoid becoming the next Target.It's important to point out that the number and types of individuals who perpetrate attacks has changed…
» read this article
By: Eran Leib
Data is everywhere, exploding, and growing exponentially. It’s structured. It’s semi-structured. It’s unstructured. It’s stored across different platforms, networks, systems, on premise and in
the cloud. But, it all has one thing in common: data is data, and it all needs to be controlled and protected.Data is critical intellectual property at the core of the business. Meanwhile, its
volume – we’re talking exabytes here – has spiraled out of control and become unmanageable. The larger the organization, the greater the data sprawl, exacerbating the danger from internal and
external threats such as social engineering, malicious activities, corporate espionage, theft, and even simple errors…
» read this article
By: Lars Mansson
The default direction of any conversation (sales-driven or otherwise) about the topic of mediation is a reversion to its role as a billing system front-end. This may be because mediation
product users have traditionally lacked the appetite to deploy their systems in innovative ways. Or it may be that their systems have not been configurable to address use cases other than
pre-processing for billing runs. Or perhaps it’s some combination, or variant, of the two. Whichever is the case, this reality is changing…
» read this article
By: Jesse Cryderman
Customers Yearn to ChurnGlobal telecom operators need to shape up their mobile broadband capabilities, or they risk losing customers en masse. That's the gist of a new report from Ovum, which
cautions that up to half of global mobile customers are poised to churn. The warning is based on Ovum's global survey, 2014 Telecoms Customer Insights. According to the survey, about a quarter of
global mobile customers definitely plan to change providers in the next 12 months, and another quarter say they might…
» read this article
By: Tim Young
“There is no such thing as perfect security. Only varying levels of insecurity.”-Salman Rushdie A few summers ago, I had a brief fling with a great example of escapist television. I’m usually
drawn to shows like Mad Men or Boardwalk Empire or The Wire. They require a fair bit of attention and are packed with details that the casual viewer might miss. If you skip an episode, you’re lost.
The same cannot be said for my summertime distraction, Burn Notice. If you haven’t had the pleasure, it’s a fun-to-watch bit of brain-candy that has a wider plot, but is mostly about an outcast CIA
agent helping clients in a style that is equal parts A-Team and Remington Steele…
» read this article
…
» read this article