4 Considerations for a Secure Cloud Environment

Digital attackers are increasingly turning their attention to the cloud. According to the 2020 Trustwave Global Security Report, the volume of attacks targeting cloud services more than doubled 7% in 2018 to 20% a year later. This growth made cloud ser… Continue reading 4 Considerations for a Secure Cloud Environment

Is Telco Cybersecurity the New Competitive Edge for Service Providers?

In my 20+ years working for and with telecommunication providers around the world, I’ve witnessed firsthand how the industry has evolved to offer continuously improved services to a wide audience of consumers. One of the most amazing things about this … Continue reading Is Telco Cybersecurity the New Competitive Edge for Service Providers?

The Death and Rebirth of Musashi.js OR How I turned personal failure into better teaching tools.

A little background… As I stood in front of a class of developers trying to explain cross-origin resource sharing (CORS), I knew I wasn’t conveying it well enough for a significant subset of the group. It was Autumn 2017 (not my password at the time, b… Continue reading The Death and Rebirth of Musashi.js OR How I turned personal failure into better teaching tools.

Expansion opportunities in the next-generation wireless BSS market

Business support systems (BSS) are necessary to provide the fast-changing requirements in 5G and enhance customer experiences, a Frost & Sullivan research reveals. They also help communication service providers (CSPs) deliver personalized service … Continue reading Expansion opportunities in the next-generation wireless BSS market

Bit-and-piece DDoS attacks increased 570% in Q2 2020

Attackers shifted tactics in Q2 2020, with a 570% increase in bit-and-piece DDoS attacks compared to the same period last year, according to Nexusguard. Perpetrators used bit-and-piece attacks to launch various amplification and elaborate UDP-based att… Continue reading Bit-and-piece DDoS attacks increased 570% in Q2 2020

Bringing network stability and security back to businesses big and small

If you remember the pre-pandemic fun of dining out in a Chinese restaurant, then you probably also know that, at the end of the meal, nobody wants to break open the fortune cookie to read, “May you live in interesting times.” While seemingly a blessing… Continue reading Bringing network stability and security back to businesses big and small

ExpertOps Federal: Managed Services in a FedRAMP Certified Cloud Has Arrived

According to its own website, FedRAMP serves three different of partners: federal agencies, Cloud Service Providers (CSP) and third-party assessment organizations. This article will focus on CSPs and how a good CSP can provide services that provide mon… Continue reading ExpertOps Federal: Managed Services in a FedRAMP Certified Cloud Has Arrived

Today’s whitelisted applications are tomorrow’s security breaches

You may have seen the news last week, but if you haven’t, let me bring you up to speed. The research team at PerimeterX disclosed a “CSP bypass” involving the use of Google Analytics. Naturally, this generated a lot of buzz – whi… Continue reading Today’s whitelisted applications are tomorrow’s security breaches

Simple and reliable network security for SMBs

When it comes to cybersecurity, what’s the difference between SMBs and large enterprises? If you guessed that the difference is related to the number of cyberattacks, then you’d be wrong. SMBs suffer just as many cyberattacks as large enter… Continue reading Simple and reliable network security for SMBs