YOU ARE AT:TagsNetwork security

BROWSING: network security

Which DDoS Attack Vectors Lead the Pack? (Reader Forum)

The proliferation of the Internet of Things (IoT) is giving hackers fresh ammunition. As IoT devices continue to prioritize convenience over security, cybercriminals are easily gaining control of these devices and using them to build botnets to launch Distributed Denial of Service (DDoS) attacks. Kaspersky...

Verizon DBIR: Ransomware rising

If it seems like you're hearing more about ransomware attacks, it's not just that more high-profile attacks -- like the recent takeover of some city government systems in Atlanta, Ga.-- are making the news. Ransomware attacks have increased significantly in the last couple of...

Hybrid clouds susceptible to zero-day exploits, finds survey

Hybrid cloud complexity creating security challenges Container security company Capsule8 recently released a survey conducted by Enterprise Strategy Group (ESG) in November 2017 exploring trends in hybrid cloud security. Among these trends, the survey found the complexity of hybrid cloud environments is making it difficult...

Enterprise IoT security considerations

Security concerns are regularly cited as the number one IoT deployment concern or barrier to adoption. “Security” covers a wide swath of considerations, both in terms of prevention and reaction. One of the first things that every expert acknowledges is that vulnerabilities and penetration will...

Cyber attacks infiltrate the Olympics

As athletes battle it out on the rinks and slopes of the Pyeongchang Olympics, a quieter fight is underway on Olympic networks. The "Olympic Destroyer" attack has reportedly caused disruptions to the event's Wi-Fi network and took down the official web site just as...

How to improve network security with NFV and SDN

Securing open distributed architectures Service providers have gravitated toward open distributed architectures over the past few years with the rise of network functions virtualization (NFV), software-defined networking (SDN), virtual machines, containers and other technologies. Although network operators have been eager to embrace open distributed architectures...

Commerce Department seeks input on mitigating botnet threats

As large-scale, automated "botnet" attacks become a matter of increasing concern for the internet of things, the U.S. Department of Commerce and the Department of Homeland Security are looking for insights on how to prevent and address such attacks. The department recently released a draft...

Test and Measurement: P3 expands network testing team

P3 Communications is doubling its interference hunting team P3 Communications plans to double the size of its interference hunting team over the next year and expand the geographic areas in which it operates, to help operators deal with an increasingly complex radio frequency environment. Michael Schwab,...

Test and Measurement: Ixia Security Report finds shifting network environment

Networks are expanding in multiple dimensions -- and that means that potential vulnerabilities are as well, according to a new report from Ixia. Attack surfaces are increasing in step with "the growth in IT complexity in three specific dimensions: (1) the number of data locations where...

Reader Forum: Recent attacks on RDP – what you should know

A recent rash of malware attacks on Microsoft’s RDP calls into question current thinking in terms of battling Trojan attacks. Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something...

Aricent White Paper: 10 Trends Impacting Network Security Product Roadmaps

The advent of hyper-connected endpoints via heterogeneous, unconventional means and the rise of cloud-based virtualization economies demand a digital business model capable of combatting increasingly-sophisticated cyberattacks, and navigating a complex, rapidly-evolving threat landscape. Today’s network security products — which are the building blocks for...

Reader Forum: Is love of sports increasing mobile subscribers’ risks of malware attacks?

Mobile operators should look to sports fans as a way to educate them on potential security threats and the opportunity to sell new services. Mobile has changed the way people experience sporting events as fans shift to the digital arena to...

Reader Forum: For CSPs IoT, NFV and SDN is era of growing opportunity and risks

As the telecommunications space evolves to serve new segments like IoT and use new technologies like NFV and SDN, security remains a critical challenge This is a time of great opportunity for communications service providers. Demand for all sorts of cloud-based services is on the...

Reader Forum: 3 tips to prepare for the Rio ‘data’ Olympics

Baidu provides 3 tips for operators looking to support a surge in data connected with the upcoming 2016 Summer Olympic Games in Brazil With spectators streaming the events worldwide, athletes posting pregame rituals on social media and fans taking selfies in the stands, smartphone activity...

Cisco agrees to acquire cloud security firm for $293M

In a move intended to bolster its end-to-end cloud security portfolio, Cisco this week agreed to acquire Massachusetts-based security startup CloudLock for $293 million. CloudLock uses an API-based approach to provide cloud access security broker tech geared toward enterprise-grade security and analytics related to cloud...

IBM pushing security for telco hybrid cloud platforms

Telecom operators are increasingly turning to the cloud as a cost-effective way to provide enterprise customers with the scalable compute, storage and other functionality needed to remain competitive. As more and more secure data crosses between telecom networks from private to public and hybrid cloud...

Reader Forum: Signaling networks bring vulnerabilities

Exploring SS7 fraud, mobile network security and subscriber privacy It’s been a transformative year for mobile technology. Networks are evolving quickly and consumers and enterprises have taken advantage of the abundance of new, “connected” opportunities. However, with changes in mobile innovation and technology comes increasing...

Ixia Webinar: Network Security Deployment Best Practices

Today’s threat landscape demands the use of a complex array of proactive network security systems and monitoring solutions. What are the most common and useful network security solutions you should consider - next-gen firewalls, web-application firewalls, intrusion prevention systems? Many of these security tools require...