Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis th… Continue reading Closed-Loop Automation: What it means for CSPs | Allot

5 Key Takeaways from #MWC19

MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference.  With apologies to Don Adams, it really is time to Get Smart! From Smart Cities and Smart Hom… Continue reading 5 Key Takeaways from #MWC19

Casio Watch Gets a MEMS Oscillator Upgrade

We’ve got to admit to being a bit of a Casio G-Shock watch geek. The big, chunky watches were every day carry items that survived everything we dished out, right up until the smartphone made wearing one seem redundant. But others continue to use and abuse G-Shocks, and some brave souls even hack them.

Replacing the standard quartz crystal with a temperature-compensated MEMS oscillator is one hack that [Alex] tried, and it appears to have worked out well. His project write-up doesn’t specify which MEMS oscillator was used, but we suspect it’s the SiT1552 TCXO. With its extremely small size, …read more

Continue reading Casio Watch Gets a MEMS Oscillator Upgrade

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in rever… Continue reading Home Digital Asset Security

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabil… Continue reading 5G: Big CSP “Security as a Service” Opportunity

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us … Continue reading Home Router…, or Trojan Horse?

Remote Hardware Takeover via Vulnerable Admin Software

Increased digitization means that web browsers are integral to our daily lives. For example, I’m writing this article on a cloud-based word processing application, whereas a few years ago, I may only have had the option of using an executable des… Continue reading Remote Hardware Takeover via Vulnerable Admin Software

Add-ons, Extensions and CSP Violations: Playing Nice with Content Security Policies

Presently sponsored by: Netsparker – a scalable and dead accurate web application security solution. Scan thousands of web applications within just hours.

You know what I really like? A nice, slick, clean set of violation reports from the content security policy (CSP) I run on Have I Been Pwned (HIBP). You know what I really don’t like? Logging on to Report URI and being greeted with something like this:

This blog post

Continue reading Add-ons, Extensions and CSP Violations: Playing Nice with Content Security Policies

APTs are targeting IT service providers

Managed service providers (MSPs) and cloud service providers (CSPs) are under attack by advanced persistent threat (APT) groups, the U.S. Department of Homeland Security warns. “MSPs provide remote management of customer IT and end-user systems. … Continue reading APTs are targeting IT service providers