Smart & Secure Blog

The gift that keeps on giving: 7 tips to avoid cyber security threats

Did you give or receive a toy or new parental control or security app for the holidays? While well-intentioned, you may have inadvertently created a security breach for the recipient or opened your family up to unwanted surveillance. The Internet of security breaches The Internet of Things (IoT) is not just for your smart doorbell…

The power of real-time capabilities for communication service providers

A colleague of mine recently alerted me to a white paper she read about the competitive advantage of real-time. The concept of “real-time” remains a hot topic, and I can appreciate the value of this material, especially since it was featured on Vanilla Plus, a leading telecom content platform that I find quite insightful. Although…

Examples of Large & Small Business Cyber Attacks: Fighting for Survival Against a New Wave of Cyber Criminals

There are two types of businesses in the world today. Those that have been attacked by cybercriminals, and those that haven’t, yet. In what is becoming increasingly clear, most of these businesses are currently sitting vulnerable, at the edge of an historic crisis. Just this month, according to Bleeping Computer, electronics retail giant MediaMarkt suffered…

The FCC is concerned about 5G security – shouldn’t you be?

In today’s 5G world, DDoS attacks have the power to disrupt network services and disturb the mobile subscriber experience to such an extent that customers may lose faith in their mobile carrier and leave, contributing to increased rates of subscriber churn and penalties due to SLA breaches. For quite some time, my colleagues and I…

How greenfield 5G network operators like DISH are ushering in a new era of cybersecurity

In the world of telecom, a greenfield service provider is one where the deployment and configuration of its network are entirely new – where none existed before. In the USA, DISH is getting a lot of attention for its greenfield deployment of the nation’s first cloud-native, Open RAN-based 5G network. As Fierce Wireless recently pointed…

DDoS attacks and 5G: everything you need to know

Cybersecurity geeks may already know this historical tidbit… The first DDoS attack occurred back in 1999, when a computer at the University of Minnesota suddenly came under attack from a network of 114 other computers infected with a malicious script called Trin00. What they may not know, or remember, is that, earlier that same year,…

The top trends CSPs and enterprises will face in 2021 and beyond

Like most everyone else, our way of working has been significantly affected by the COVID-19 pandemic. Fortunately, one thing that can’t be stopped, even if it may have been slowed, is the rollout of 5G, which remains a high priority around the world. As we move into 2021, an increasing number of operators are moving…

Lesson from Lockdowns: Crucial to Scale-Up Cybersecurity Services

The COVID-19 pandemic and governmental movement restrictions have led to an increased dependency on online services for individuals and businesses alike. Cybercriminals quickly identified this trend as an opportunity for gaining profits. They responded by intensifying cyberattack volume and introducing sophisticated coronavirus-themed attack schemes to steal sensitive user information and business data. At Allot, we…

How important is cybersecurity to mobile subscribers?

(This is a guest post by Ian Parkes, director at Coleman Parkes Research, a full-service, UK-based, end-to-end B2B market research company covering international telecom and a wide range of other industries.) My colleagues and I recently concluded an extensive research survey we conducted in partnership with Allot and the results were, to say the least,…

1 2

CONTACT SALES

Discover the best solutions for your organization

You’re all set!

We look forward to meeting with you on Monday, June 28 @ 14:00 EST. The meeting details will be sent to your mail box in a few seconds.

For a deep dive into Allot’s SMB solutions, we’d like to offer you a free copy of our position paper
Security for SMBs: Threats and Opportunities on the Rise.

Get your e-book »