SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Protecting the Four Pillars: Physical, Data, Process, and Architecture

By: Jesse Cryderman

“Cyber threat is one of the most serious economic and national security challenges we face as a nation ... America’s economic prosperity in the 21st century will depend on cybersecurity.” —President Barack Obama, 2009 The hackers are winning. At the end of October, Adobe Systems announced that data belonging to 38 million of its customers had been obtained by hackers, who’d infiltrated the company’s systems at least two months earlier, along with the source code for three of its products…

» read this article

Securing a VPN Against Advanced Malware Threats

By: Jim Deerman

That’s the good news. The bad news is that VPNs have a tendency to create a “weak link” in an otherwise secure system because they bypass some of the perimeter defenses that are trying to stop the bad guys from entering a corporate network. Opening a network for VPN access can expose it to opportunities for attack from state-sponsored cyberterrorists, hacktivists pursuing a political agenda or even basic hackers out to exploit every possible vulnerability of the network…

» read this article

Hacking 4.0: What will they hack next?

By: Jesse Cryderman

On August 10, Marc Gilbert heard a voice coming from the bedroom of his two-year-old daughter, but it wasn’t his wife’s and it certainly wasn’t a lullaby. The voice belonged to a man with a British accent who had hacked into the Texas home to unleash a diatribe of explicit language. When Gilbert entered the room to investigate, he discovered a seemingly demon-possessed child-monitor webcam, but before he could unplug it, he and his wife were also verbally abused by the hacker…

» read this article

DDoS Attacks Are on the Rise. Is Your Network Prepared?

By: Becky Bracken

Distributed denial-of-service, or DDoS, attacks are on the rise, and gaining in frequency and complexity. Fortunately, they present a real opportunity for service providers to yield a quantifiable benefit to just about every enterprise customer in just about any vertical market imaginable. DDoS attacks have become the weapon of choice for computer hackers with a beef against religious organizations, governments, banks, and multinational corporations, among others…

» read this article

Security Regulations: How to Innovate in a Global Environment

By: Jesse Cryderman

Regulation and security have been closely connected since the beginning of modern civilization. It could even be argued that without proscription there would be no security.The very first telecommunications standards, the rules that governed the transmission of telegraphs around the globe, were established in 1865 along with the International Telegraph Union as an international treaty, and willfully breaking those standards was considered a potential act of war…

» read this article

Mobile's Security Problem

By: Becky Bracken

Securing a mobile network is a bit like playing dodgeball in the dark: you know you’re going to get hit, but you have no idea when or from where. That presents real challenges for mobile network operators (MNOs) preparing for a future of revenues generated by services like mobile banking, healthcare and even connected cars, all of which demand highly secure environments. And, unfortunately, there are several factors working against the achievement of that goal, most notably the explosion of devices accessing networks that provide exponential opportunities to compromise those networks…

» read this article

Selling Snoop-Proof Services

By: Becky Bracken

You don’t have to be in the international espionage game to be interested in encrypted, secure communications services that can’t be accessed by spies, government agencies or even a suspicious spouse. But when Edward Snowden, a former contractor for the National Security Agency (NSA), released classified information about the United States government’s covert surveillance activities, he not only made average citizens think twice about even the most mundane emails and phone calls, he also brought down some of the most well-known and highly regarded encrypted-email service providers in the US…

» read this article

COMET News: November 2013

By: Jesse Cryderman

SDN and NFV Software defined networking (SDN) is hot news, as it represents the future of communications networks. How far off is SDN, how do we get there, and which is the best path forward? One thing is for sure: nothing is set in stone or fully expressed in a standard. At the Digital Disruption event, Fred Feisullin of Sprint said, "There are as many different approaches to virtualizing the network as there are service providers today." Regardless of the approach, new research from the Dell'Oro Group predicts a six-fold increase in SDN spending in the next four years, and service providers are aggressively pursuing this virtualized technology, so this trend appears to be more than just buzz…

» read this article

Letter from the Editor: November 2013

By: Tim Young

“Distrust and caution are the parents of security.” —Benjamin Franklin I became a homeowner for the first time relatively recently. Having spent much of my adult life in large cities or areas in which I didn’t plan on staying for more than a few years, renting always made more sense. Forking over a down payment, undergoing unending mortgage scrutiny and signing on the dotted line is never fun, but it’s nice to have the freedom to change a space as needed, not to mention having a little chunk of the planet I can call my own…

» read this article

Protecting Networks From Fraud Requires a One-Two punch

…

» read this article
FEATURED SPONSOR:

Latest Updates





Subscribe to our YouTube Channel