Allot Smart & Secure

How important is cybersecurity to mobile subscribers?

(This is a guest post by Ian Parkes, director at Coleman Parkes Research, a full-service, UK-based, end-to-end B2B market research company covering international telecom and a wide range of other industries.) My colleagues and I recently concluded an extensive research survey we conducted in partnership with Allot and the results were, to say the least,…

Bringing network stability and security back to businesses big and small

If you remember the pre-pandemic fun of dining out in a Chinese restaurant, then you probably also know that, at the end of the meal, nobody wants to break open the fortune cookie to read, “May you live in interesting times.” While seemingly a blessing, this English expression, which purports to be a translation of…

Simple and reliable network security for SMBs

When it comes to cybersecurity, what’s the difference between SMBs and large enterprises? If you guessed that the difference is related to the number of cyberattacks, then you’d be wrong. SMBs suffer just as many cyberattacks as large enterprises.   The difference between Enterprise and SMB network security So, then, when it comes to cybersecurity,…

Cybersecurity & Coronavirus: Protecting Customers at Home

During these challenging times, when everyone is working, studying, and streaming from home, securing the home network is more important than ever.   I’m co-producing a webinar about this, where you can learn more about the growing threat landscape and our HomeSecure solution. If you can join the live webinar, we’ll be on-hand to address…

Will Your Defense Conquer World Cup Malware?

Don’t let cybercriminals score. Beat their game-plan.  Cybercriminals typically take advantage of the huge public interest in major international events. The FIFA World Cup 2018 that begins shortly in Russia is no exception and cybercriminals have been busy exploiting the excitement about the world’s biggest sporting event. The numbers are staggering. FIFA estimated that 715.1…

2018 Predictions: Will Technology Deliver on its Promise in 2018?

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

Are you caught in the Bitcoin “gold rush” but is someone else reaping the rewards?

Regardless of what you believe about cryptocurrency, it’s still around. People are still getting rich – some legitimately and others, well, less so. While doing some network data analysis, we discovered an ingenious kind of “startup” that has been spawned as a result of the cryptocurrency opportunity: Device hijacking for cryptocurrency mining. To understand the…

Security, Security, Security: The Top Three IoT Challenges Confronting CSPs

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When it comes to IoT (Internet of Things), CSPs should pay particular attention to the 3 S’s: Security, Security, Security. Unless internalized, there could be some real heartache coming to…

IoT Security: Threat to an Opportunity

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth as the adoption of connected devices begins to outstrip that of mobile handsets.  From fleet tracking telemetry to home alert systems, the use cases have been endless and many…

1 2