How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

In the world of telecom, a greenfield service provider is one where the deployment and configuration of its network are entirely new – where none existed before. In the USA, DISH is getting a lot of attention for its greenfield deployment of the nation… Continue reading How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

DDoS attacks and 5G: everything you need to know

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script c… Continue reading DDoS attacks and 5G: everything you need to know

The top trends CSPs and enterprises will face in 2021 and beyond

Like most everyone else, our way of working has been significantly affected by the COVID-19 pandemic. Fortunately, one thing that can’t be stopped, even if it may have been slowed, is the rollout of 5G, which remains a high priority around the world. A… Continue reading The top trends CSPs and enterprises will face in 2021 and beyond

Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

The COVID-19 pandemic and governmental movement restrictions have led to an increased dependency on online services for individuals and businesses alike. Cybercriminals quickly identified this trend as an opportunity for gaining profits. They responded… Continue reading Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

Application Control and Traffic Shaping: key factors to consider

If you’re like me, then you’ve been pretty busy lately coping with the new world in which we find ourselves. Regardless, the team and I have made some interesting observations, which I want to share with you. As I’m sure you know, continuing concerns a… Continue reading Application Control and Traffic Shaping: key factors to consider

Bringing network stability and security back to businesses big and small

If you remember the pre-pandemic fun of dining out in a Chinese restaurant, then you probably also know that, at the end of the meal, nobody wants to break open the fortune cookie to read, “May you live in interesting times.” While seemingly a blessing… Continue reading Bringing network stability and security back to businesses big and small

COVID-19 CSP challenges: A new normal awaits.

Over the last few months, we’ve seen dramatic changes in network traffic and user behavior because of the pandemic. COVID-19 lockdowns and other measures have changed things. Many of us are now accustomed to working, learning, and seeking entertainment… Continue reading COVID-19 CSP challenges: A new normal awaits.

Simple and reliable network security for SMBs

When it comes to cybersecurity, what’s the difference between SMBs and large enterprises? If you guessed that the difference is related to the number of cyberattacks, then you’d be wrong. SMBs suffer just as many cyberattacks as large enter… Continue reading Simple and reliable network security for SMBs

5G hype vs reality: what are the real problems and new opportunities?

Throughout the telecom world, if people aren’t talking about Covid-19, then they’re probably talking about 5G.   The promise of 5G wireless service is significant. It is touted to provide cheap, fast, ubiquitous connectivity by increas… Continue reading 5G hype vs reality: what are the real problems and new opportunities?

Cybersecurity & Coronavirus: Protecting Customers at Home

During these challenging times, when everyone is working, studying, and streaming from home, securing the home network is more important than ever.   I’m co-producing a webinar about this, where you can learn more about the growing threat la… Continue reading Cybersecurity & Coronavirus: Protecting Customers at Home