Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose birth years begin with the…

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabilities, 5G is not just another bigger, better, faster network than 4G. It is a completely new concept in network…

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can open up our devices to…

From the Flu to DDoS – an Epidemic of Epidemics!

Last week, while the mobile industry was busy celebrating telecom innovation at MWC18, another kind of innovation was making headlines: a record 1.35 Tbps DDoS attack was launched (and it has already been surpassed), causing some disruption and highlighting the potential for much worse. In this instance, the attack was detected and mitigated relatively quickly—but…

What’s Happening at the Mobile World Congress, Barcelona 2018

Yes, the new year is well underway and it’s time for the highlight of the mobile industry’s calendar—the Mobile World Congress in Barcelona. GSMA claims that this year’s event is bigger and better than any before with delegates from all four corners of the globe looking to learn about the latest and greatest developments in…

The Economics of Home IoT Cyber Crime

IoT devices in the home are increasingly being targeted by cyber criminals. This can lead to invasions of personal privacy as well as attacks on Communications Service Providers (CSPs) and IoT vendor property and infrastructure. It is likely that this trend will continue with attacks becoming more widespread and sophisticated. The past five years has…