Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis that reduced tens of thousands of NOC alarms to a single “parent alarm”, which highlighted…

Don’t be a Dumb Pipe! You CAN Analyze Encrypted Video Traffic

If you were to ask consumers in regulated countries what the main driver was for choosing their mobile service provider, chances are they’ll tell you that when it comes to data bundles and price, they’re all similar. So, what is most important to them?   Well here are a few hints. By 2021, 82% of…

Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

“Anonymous” to Erase Israel from the Internet—Or Is It?

  Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

DPI: Enabling secure, personalized and metered services

Why Deep Packet Inspection may be the key to enabling secure, personalized and metered services, should the FCC decide to end net neutrality in the USA. And isn’t it ironic?* It’s like spamming the FCC with bot driven anti net neutrality comments. It’s like a DDoS attack keeping anyone from commenting on it OK maybe…

Are you caught in the Bitcoin “gold rush” but is someone else reaping the rewards?

Seems like everyone has been talking about Bitcoin lately. If you remember the dot com boom of the late nineties like I do, you might have a slight feeling of deja vu. But whether we are facing a bubble or not, one thing learned recently while doing some network data analysis, is that a new…

Net Neutrality – Dead as a Dodo

Net neutrality is about to go the way of the Dodo Bird. Regardless of whether you are pro-Trump or anti-Trump, pro-regulation or anti-regulation, this is a huge change in how we access the internet. Will service providers favor their own services, strike deals with content providers that effectively box out smaller competitors or create a…

BadRabbit: Is Three the Magic Number, or is this The New Normal?

Did you know that the damages from Ransomware are expected to be more than $5 billion by the year 2020? This is not just the cost of paying the ransom itself, but also the price of destruction and loss of data, the downtime involved getting systems back online, and the disruption to the business which…

Biting the Hand that Feeds You: When IoT-Based Attacks Strike Service Providers

While we’re arming ourselves, our businesses and organizations against IoT-based attacks, few people talk about the damage they do to service providers. It’s something that gets overlooked, but the potential for causing detrimental impact is considerable. Service providers can suffer particularly badly because: They can be a target Attacks can originate from within their own…

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks for service providers, and how can you stay ahead of the game to keep yourself and your customers safe? Hackers Back in the Spotlight Cybersecurity Ventures   predicted that “global spending…