Smart & Secure Blog

The power of real-time capabilities for communication service providers

A colleague of mine recently alerted me to a white paper she read about the competitive advantage of real-time. The concept of “real-time” remains a hot topic, and I can appreciate the value of this material, especially since it was featured on Vanilla Plus, a leading telecom content platform that I find quite insightful. Although…

Examples of Large & Small Business Cyber Attacks: Fighting for Survival Against a New Wave of Cyber Criminals

There are two types of businesses in the world today. Those that have been attacked by cybercriminals, and those that haven’t, yet. In what is becoming increasingly clear, most of these businesses are currently sitting vulnerable, at the edge of an historic crisis. Just this month, according to Bleeping Computer, electronics retail giant MediaMarkt suffered…

How European telecoms defend their customers from the latest cybersecurity threats

Have you seen the latest cyberthreat report? The numbers are mind-boggling! Our data show that Allot’s network security services blocked cyberthreats from harming European subscribers 653,996,978 times in the first half of the year. 653,996,978 times!  That averages out to more than 2,400 security incidents every minute, and that’s just among Allot-protected customers in Europe….

DDoS attacks and 5G: everything you need to know

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script called Trin00. What they may not know, or remember, is that, earlier that same year,…

How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines

Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half of the Internet. Now, Mirai is back with a new target. Last week, researchers from IBM X-Force found that variants of the infamous…

Why CSPs Should Care About Phishing

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what the Ford T did to the car industry – bring it to the masses. Phishing is the…

Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, these devices are notoriously vulnerable, or worse, the security implementation is so flawed that they are counter-protective leaving the consumer with a false feeling…

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose birth years begin with the…

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabilities, 5G is not just another bigger, better, faster network than 4G. It is a completely new concept in network…

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can open up our devices to…

1 2

CONTACT SALES

Discover the best solutions for your organization

You’re all set!

We look forward to meeting with you on Monday, June 28 @ 14:00 EST. The meeting details will be sent to your mail box in a few seconds.

For a deep dive into Allot’s SMB solutions, we’d like to offer you a free copy of our position paper
Security for SMBs: Threats and Opportunities on the Rise.

Get your e-book »