Determinants of Success in Tomorrow’s Ultra-Connected World

(The following article is reprinted from The Fast Mode)   A growing number of players, from Mobile Network Operators to Mobile Virtualized Network Operators, are vying for their share of today’s competitive telecoms market. With brand loyalt… Continue reading Determinants of Success in Tomorrow’s Ultra-Connected World

CSPs Have a Chance to Address Consumer IoT Security Needs

(The following article is reprinted from Brilliance Security Magazine) Consumer cybersecurity needs have significantly changed over the past years. With the rising global dependence on smart devices for everything from waking up in the morning to dimmi… Continue reading CSPs Have a Chance to Address Consumer IoT Security Needs

Everything You Need to Know About Azure Infrastructure – July 2019 Edition


It may be the middle of Summer but there is a lot going on with Azure, this is what you need to know about Azure for the month of July.

The post Everything You Need to Know About Azure Infrastructure – July 2019 Edition appeared first on Petri.

Continue reading Everything You Need to Know About Azure Infrastructure – July 2019 Edition

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what th… Continue reading Why CSPs Should Care About Phishing

Silex Malware: Deadly New Virus Bricks 1000s of IoT Devices

Your IoT’s not sick – Someone just turned it into a brick! A 14-year-old hacker created a new strain of malware called “Silex malware” which bricked over 4000 IoT devices in the span of a few hours.   Once again, the w… Continue reading Silex Malware: Deadly New Virus Bricks 1000s of IoT Devices

Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, these devices are notor… Continue reading Brute Force Attacks on IoT – Here to Stay?

5G Networks: Shaping Quality of Experience (QoE) in the 5G Era

After reigning for 8+ years as the standard for mobile broadband, 4G networks are about to be dethroned by 5G. 5G networks promise dramatically faster speeds, lower latency and massive machine to machine communications – but is this enough to ens… Continue reading 5G Networks: Shaping Quality of Experience (QoE) in the 5G Era

10 Ransomware Attacks You Should Know About in 2019

Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019. The 2019 ransomware landscape is quite diverse – security re… Continue reading 10 Ransomware Attacks You Should Know About in 2019

DNS Attack on Yandex – Can It Happen to You?

Last week, Russian media was hit with news about massive DNS (Domain Name System) attacks on Yandex, the country’s biggest technology company and local giant of internet search – essentially, the Google of Russia. The network attacks exploi… Continue reading DNS Attack on Yandex – Can It Happen to You?

Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis th… Continue reading Closed-Loop Automation: What it means for CSPs | Allot