How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines

Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half of the Internet. Now, Mirai is back with a new target. Last week, researchers from IBM X-Force found that variants of the infamous…

How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines

Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half of the Internet. Now, Mirai is back with a new target. Last week, researchers from IBM X-Force found that variants of the infamous…

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what the Ford T did to the car industry – bring it to the masses. Phishing is the…

Video Streaming: A Hidden Threat to Enterprise Quality of Experience (QoE)

The Rise of Video Streaming Popularity As Disney gears up to launch its streaming service, joining Amazon, Apple, Facebook, and more, video streaming is being adopted into the daily routine of many. Most people will download an episode or two for their commute home, and some people may even enjoy watching their favorite series at…

What’s Happening at the Mobile World Congress, Barcelona 2018

Yes, the new year is well underway and it’s time for the highlight of the mobile industry’s calendar—the Mobile World Congress in Barcelona. GSMA claims that this year’s event is bigger and better than any before with delegates from all four corners of the globe looking to learn about the latest and greatest developments in…