SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Know Your Enemy: A Field Guide to Today's Threats

By: Tim Young

Getting a solid grip on the true scale of the economic cost of cyber-crime is no simple task. Hackers don’t tend to put out press releases about how much they stole, and the scale of the losses are often difficult for the victims to estimate. In fact, a surprising proportion of internet breaches are ongoing and, as you read this, a hacker may be digging through some other corner of your network, siphoning sensitive information and pocketing cash. Furthermore, if you’re like many companies or governments, the last thing you plan to do is report those breaches for fear of appearing vulnerable…

» read this article

Mobile Privacy: Protecting Personal Data inToday's Digital World

By: Alec Main

When it comes to consumer privacy, there are two types of mobile Internet user: 1) those who are nervous about it, and 2) those  who know that they should be nervous about it. Wait, what? The mobile Internet is an amazing place full of conveniences not afforded to the hard-wired desktop. With the power of a mobile device, users have location-based services that offer up ready-access to restaurants, gas prices, weather reports, shopping deals and more. Geo-tagging of photos that you take so that you can retrace and recall your summer vacation…

» read this article

Strategies to Avoid End-user Vulnerability

By: Nancee Ruzicka

Research recently presented by Ericsson indicates that by the end of 2019 it is predicted there will be more than 9 billion mobile subscriptions and that greater than 80% of those subscriptions will be for mobile broadband (i.e. data) services. And that doesn’t include estimates for M2M and other connected devices. As the number of smart phones and connected devices soars, service providers become increasingly vulnerable to hacks and data breaches resulting from compromised devices and applications in customers’ hands and homes…

» read this article

The Rise of Security Operation Centers

By: Jesse Cryderman

Hacking and identity theft has become a part of daily life, just like catching a cold or getting a flat tire. It’s one of those annoyances that we’ve come to accept as part of modern life. It wasn’t always that way, however. Prior to our ubiquitous, high-speed networks, hacking was relegated to geek-speak and movie scripts. Today, however, a data intrusion is just as likely to be pulled off by a financially motivated criminal organization as it is a “script kiddy” operating out of his parent’s basement…

» read this article

Protecting Against DoS Attacks

By: Aleksey Abramovich

According to the Ponemon Institute, on average, one denial-of-service (DoS) attack costs the owner of a website, including those associated with telecom organizations, more than 166 thousand dollars. Every year, DoS attacks are becoming more expensive as site owners increasingly intensify protection against them. But who is implementing these DoS attacks and for what reason? And what is the best way to be prepared to protect your website? The Birth of DoS Attacks The first DoS attack was registered in September 1996…

» read this article

Virtualized Elements, Real Risks: is NFV next?

By: Jesse Cryderman

Network virtualization is the hottest innovation to occur in the telecom space since wireless itself; perhaps even more so because it alters our communication framework on such a fundamental level. Some who have been in the telecom space much longer might disagree, but I contend that we are in the process of completely changing the fabric of networking itself, and it is revolutionary. Virtualization is changing the way vendors and service providers envision their respective future. And it’s moving faster every day…

» read this article

How to avoid becoming the next Target

By: Jesse Cryderman

There was a time when many businesses felt safe from cybercrime. As the number of high-profile hacking incidents continue to grow, that time has passed. Today, every business is a target. In fact, according to Jeffery Guy, a former cyber security expert for the U.S. Air Force, 70 percent of all cyber attacks are waged against small businesses. There is no way to avoid being a target, but there may be ways to avoid becoming the next Target.It's important to point out that the number and types of individuals who perpetrate attacks has changed…

» read this article

Cybersecurity from the Inside: Protecting Structured, Unstructured, & Semi-structured Data

By: Eran Leib

Data is everywhere, exploding, and growing exponentially. It’s structured. It’s semi-structured. It’s unstructured. It’s stored across different platforms, networks, systems, on premise and in the cloud. But, it all has one thing in common: data is data, and it all needs to be controlled and protected.Data is critical intellectual property at the core of the business. Meanwhile, its volume – we’re talking exabytes here – has spiraled out of control and become unmanageable. The larger the organization, the greater the data sprawl, exacerbating the danger from internal and external threats such as social engineering, malicious activities, corporate espionage, theft, and even simple errors…

» read this article

Service Assurance is the New Black for Mediation, BSS and OSS

By: Lars Mansson

The default direction of any conversation (sales-driven or otherwise) about the topic of mediation is a reversion to its role as a billing system front-end.  This may be because mediation product users have traditionally lacked the appetite to deploy their systems in innovative ways.  Or it may be that their systems have not been configurable to address use cases other than pre-processing for billing runs. Or perhaps it’s some combination, or variant, of the two.  Whichever is the case, this reality is changing…

» read this article

COMET News: November 2014

By: Jesse Cryderman

Customers Yearn to ChurnGlobal telecom operators need to shape up their mobile broadband capabilities, or they risk losing customers en masse. That's the gist of a new report from Ovum, which cautions that up to half of global mobile customers are poised to churn. The warning is based on Ovum's global survey, 2014 Telecoms Customer Insights. According to the survey, about a quarter of global mobile customers definitely plan to change providers in the next 12 months, and another quarter say they might…

» read this article

Letter from the Editor: November 2014

By: Tim Young

“There is no such thing as perfect security. Only varying levels of insecurity.”-Salman Rushdie A few summers ago, I had a brief fling with a great example of escapist television. I’m usually drawn to shows like Mad Men or Boardwalk Empire or The Wire. They require a fair bit of attention and are packed with details that the casual viewer might miss. If you skip an episode, you’re lost. The same cannot be said for my summertime distraction, Burn Notice. If you haven’t had the pleasure, it’s a fun-to-watch bit of brain-candy that has a wider plot, but is mostly about an outcast CIA agent helping clients in a style that is equal parts A-Team and Remington Steele…

» read this article

…

» read this article
FEATURED

Latest Updates





Subscribe to our YouTube Channel