Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis that reduced tens of thousands of NOC alarms to a single “parent alarm”, which highlighted…

Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose birth years begin with the…

5G: Big CSP “Security as a Service” Opportunity

Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and dynamic network slicing capabilities, 5G is not just another bigger, better, faster network than 4G. It is a completely new concept in network…

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us are familiar with these “Trojan horse” viruses that can open up our devices to…

Can You Keep Up with Game-Changing DDoS Attacks? Q&A from Allot’s Webinar

In our recent webinar, I discussed with Maya Canetti, Allot’s Director of Product Management, how intensified DDoS attacks against service providers have become highly destructive. We considered the newest threats, why traditional security solutions can’t cope with the rapidly changing nature of these threats, and what can be done to best protect networks. Note: If…

Security, Security, Security: The Top Three IoT Challenges Confronting CSPs

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When it comes to IoT (Internet of Things), CSPs should pay particular attention to the 3 S’s: Security, Security, Security. Unless internalized, there could be some real heartache coming to…

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last time, we focused our attention on Ping Floods. This final instalment in the education series looks at DNS Floods, what differentiates them from other kinds of DDoS attacks, and…

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks for service providers, and how can you stay ahead of the game to keep yourself and your customers safe? Hackers Back in the Spotlight Cybersecurity Ventures   predicted that “global spending…