By: Rui Paiva
Within just two years, it is expected that there will be four connected ‘things’ for every person on the planet. The growth of the Internet of Things (IoT) means more convenience and
opportunity for more people, but it comes at a cost. With so many Internet-connected devices in every home and business, the IoT is a vast playground for fraudsters—and it’s growing larger
every day. Some 15.4 million consumers were victims of identity theft or fraud in 2017, according to Javelin Strategy & Research…
» read this article
By: Jitendra Thethi
The telecoms industry—perhaps more than any other—is in the midst of a seismic disruption, the likes of which have never been seen before. The rise in OTT service providers has eroded
operators’ traditional voice and messaging revenues, while an increasingly virtualized ecosystem and the imminent arrival of 5G and the IoT all present operators with as many potential challenges
as lucrative opportunities. Under these circumstances, it’s perhaps unsurprising that a small but growing number of operators are turning to blockchain as a means of digitizing their business
processes…
» read this article
By: Itay Yanovski
As consumers forsake the mall in favor of Internet shopping, retailers are becoming increasingly reliant on their telecom providers to maintain their growing online footprint. But as the
shopping season approaches, online retailing’s growth is threatened by a seasonal tsunami of cybercrime. With cyberattacks on online retailers—including those who also maintain a brick and
mortar presence—roughly doubling every year, retailers should be doing all they can to protect their customers as never before…
» read this article
By: Paul Florack
The Federal Trade Commission (FTC) received 4.5 million robocall complaints in 2017, up from 3.4 million the prior year. This significant increase helps to explain why the robocall epidemic is
squarely in the crosshairs of wireless and wireline operators, regulators and legislators, technology vendors, and, of course, consumers. The FTC and Federal Communications Commission (FCC) have
been working with the telecommunications industry to encourage solutions to stop robocalls for several years. Illegal spoofed robocalls, where the caller name and telephone number is faked in order
to deceive the call recipient, have drawn particular attention…
» read this article
By: David DeSanto
Your network is under siege. Both the nature of the Internet and hackers’ use of automated tools mean that attacks occur around the clock. To ensure that the tools and policies you have in
place are sufficient to protect your network and data, you need to continuously assess, validate, and identify any potential weaknesses, so you can address them before they can be exploited. Not
all assessment methods are created equal, however. There is a critical difference between methods that rely on emulation and methods that rely on simulation, and data breach emulation methods
provide a more accurate assessment of your security posture Evolving Threat Landscape There is no such thing as an impenetrable network or invulnerable security…
» read this article
By: Eran Farajun
The most widely used approach used by businesses to recover from ransomware attacks has been to recover the criminally encrypted data from the backup set. This has provided a very successful
workaround to paying the demanded ransom. Success in recovering ransomware encrypted data from the backup has reduced the profits of hacker revenue streams and, as a result, ransomware designers
have evolved these attacks to not only target primary but also secondary (backup) data as well. One of the most aggressive strategies by ransomware developers for targeting backup data has been the
attack-loop…
» read this article
By: Wojciech Dziunikowski
The telecommunications landscape is becoming increasingly competitive, forcing CSPs to find ways of improving their market position. Originating mainly from the IT world, OTT players are the
main opponents, with light, easy-to-use mobile applications from companies such as Facebook, Uber and Spotify forcing customers to interact constantly with the service provider. Because they
provide access to the network powering the circulatory system of today’s economy, however, telecoms companies are well positioned to compete with OTT providers in the realm of customer
experience…
» read this article
By: Todd Murren
We exist in a world today that has witnessed more transformation in the last decade than over this past century. Knowledgeable systems digitally driven by powerful and innovative platforms and
next-gen technologies like distributed cloud, Artificial Intelligence (AI) and the all-encompassing Internet of Things (IoT) make up only a partial list. This relentless appetite for innovation and
evolution creates a pace for advancement that can present both challenges and opportunities for that measurement called “success…
» read this article
By: Erez Kreiner
Cybersecurity has become a major factor in the risk calculation of almost any company, no matter if it is a large enterprise or small home business. Various solutions are offered by many
vendors to overcome the security gaps in companies’ networks and devices, and a lot of effort is invested in searching for the “holy grail” of security, the one that will supply a fully protected
environment for all devices. As we all know, this search will probably last forever, as hackers become more sophisticated and rogue nations pool their resources to maliciously attack the larger
global community and economy…
» read this article
By: Scott St. John, Pipeline
There is a war being waged and you are at the center of it. There is an army of bad actors armed with billions of connected devices executing precise operations with sophisticated weapons aimed
at you, your loved ones, your company, and even your country. These malfeasants are seeking to destroy, pillage, and profit at your expense - and they are winning.You might think I'm being a bit
over dramatic but, unfortunately, I'm not.An entire market has been dedicated to weaponizing software, which can be bought off the shelf and even comes with call center support…
» read this article
By: Scott St. John, Pipeline
October brimmed with fascinating news and developments. Network evolution in the skies will provide gate-to-gate connectivity for portions of the Air France fleet, thanks to a new partnership
between Global Eagle and Orange Business Services. The 2018 INCOMPAS Show is set to kick off at month’s end, with a keynote panel focused on the bandwidth revolution and fiber’s key role on the
road to 5G. Cybersecurity concerns should remain top priorities, according to new findings from Vodafone on readiness and business outcomes…
» read this article