The size of distributed denial of service attacks is "growing at an alarming pace all around the world," according to NetScout Systems' 14th annual report on worldwide infrastructure security -- and as more enterprises and networks move operations to the cloud, attackers' focus is shifting...
Poland has arrested two telecom employees on suspicion of spying for the Chinese state: a Chinese employee of infrastructure vendor Huawei and an employee of Orange Telecom, according to published reports.
As reported by The New York Times, the Huawei employee is the head of the...
WASHINGTON, D.C.--Amid high anticipation for 5G capabilities and applications, the question of who is -- or ought to be -- responsible for ensuring security and privacy on those new networks is one that remains to be answered.
Does the federal government need to ensure the...
New report finds that 92% of organizations plan to increase cyber security spending
Nearly 80% of enterprise cyber security professionals think that network security is more difficult and complex now than it was just two years ago, according to a new research report.
Respondents to a...
The proliferation of the Internet of Things (IoT) is giving hackers fresh ammunition.
As IoT devices continue to prioritize convenience over security, cybercriminals are easily gaining control of these devices and using them to build botnets to launch Distributed Denial of Service (DDoS) attacks. Kaspersky...
If it seems like you're hearing more about ransomware attacks, it's not just that more high-profile attacks -- like the recent takeover of some city government systems in Atlanta, Ga.-- are making the news. Ransomware attacks have increased significantly in the last couple of...
Hybrid cloud complexity creating security challenges
Container security company Capsule8 recently released a survey conducted by Enterprise Strategy Group (ESG) in November 2017 exploring trends in hybrid cloud security. Among these trends, the survey found the complexity of hybrid cloud environments is making it difficult...
Security concerns are regularly cited as the number one IoT deployment concern or barrier to adoption. “Security” covers a wide swath of considerations, both in terms of prevention and reaction. One of the first things that every expert acknowledges is that vulnerabilities and penetration will...
As athletes battle it out on the rinks and slopes of the Pyeongchang Olympics, a quieter fight is underway on Olympic networks. The "Olympic Destroyer" attack has reportedly caused disruptions to the event's Wi-Fi network and took down the official web site just as...
Securing open distributed architectures
Service providers have gravitated toward open distributed architectures over the past few years with the rise of network functions virtualization (NFV), software-defined networking (SDN), virtual machines, containers and other technologies. Although network operators have been eager to embrace open distributed architectures...
As large-scale, automated "botnet" attacks become a matter of increasing concern for the internet of things, the U.S. Department of Commerce and the Department of Homeland Security are looking for insights on how to prevent and address such attacks.
The department recently released a draft...
P3 Communications is doubling its interference hunting team
P3 Communications plans to double the size of its interference hunting team over the next year and expand the geographic areas in which it operates, to help operators deal with an increasingly complex radio frequency environment.
Michael Schwab,...
Networks are expanding in multiple dimensions -- and that means that potential vulnerabilities are as well, according to a new report from Ixia.
Attack surfaces are increasing in step with "the growth in IT complexity in three specific dimensions: (1) the number of data locations where...
A recent rash of malware attacks on Microsoft’s RDP calls into question current thinking in terms of battling Trojan attacks.
Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something...
The advent of hyper-connected endpoints via heterogeneous, unconventional means and the rise of cloud-based virtualization economies demand a digital business model capable of combatting increasingly-sophisticated cyberattacks, and navigating a complex, rapidly-evolving threat landscape. Today’s network security products — which are the building blocks for...
Mobile operators should look to sports fans as a way to educate them on potential security threats and the opportunity to sell new services.
Mobile has changed the way people experience sporting events as fans shift to the digital arena to...
As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge
This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...
Baidu provides 3 tips for operators looking to support a surge in data connected with the upcoming 2016 Summer Olympic Games in Brazil
With spectators streaming the events worldwide, athletes posting pregame rituals on social media and fans taking selfies in the stands, smartphone activity...
In a move intended to bolster its end-to-end cloud security portfolio, Cisco this week agreed to acquire Massachusetts-based security startup CloudLock for $293 million.
CloudLock uses an API-based approach to provide cloud access security broker tech geared toward enterprise-grade security and analytics related to cloud...
Telecom operators are increasingly turning to the cloud as a cost-effective way to provide enterprise customers with the scalable compute, storage and other functionality needed to remain competitive.
As more and more secure data crosses between telecom networks from private to public and hybrid cloud...
Exploring SS7 fraud, mobile network security and subscriber privacy
It’s been a transformative year for mobile technology. Networks are evolving quickly and consumers and enterprises have taken advantage of the abundance of new, “connected” opportunities. However, with changes in mobile innovation and technology comes increasing...
Today’s threat landscape demands the use of a complex array of proactive network security systems and monitoring solutions. What are the most common and useful network security solutions you should consider - next-gen firewalls, web-application firewalls, intrusion prevention systems?
Many of these security tools require...