HomeSecure
What is ZuoRAT?
ZuoRAT is a remote access trojan (RAT) that attacks small office/home office (SOHO) routers. On June 29, 2022, Black Lotus Labs, the threat intelligence arm of Lumen Technologies, revealed the existence of ...
The gift that keeps on giving: 7 tips to avoid cyber security threats
Did you give or receive a toy or new parental control or security app for the holidays? While well intentioned, you may have inadvertently created a security breach for the recipient or ...
The power of real-time capabilities for communication service providers
A colleague of mine recently alerted me to a white paper she read about the competitive advantage of real-time. The concept of “real-time” remains a hot topic, and I can appreciate the ...
Cybersecurity & Coronavirus: Protecting Customers at Home
During these challenging times, when everyone is working, studying, and streaming from home, securing the home network is more important than ever. I’m co-producing a webinar about this, where you can learn ...
New IoT security regulations: what you need to know
(written with Lena Fuks) Over the past few years, the Internet of Things (IoT) market has been experiencing explosive growth. According to Gartner, there will be 25 billion connected devices by 2021 ...
How to Provide IoT Security in the ‘Connected Everything’ Era: NIST Guidelines
Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half ...
Why CSPs Should Care About Phishing
Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to ...
Home Digital Asset Security
Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a ...
5G: Big CSP “Security as a Service” Opportunity
Big CSP Security as a Service Opportunity with 5G The migration of cellular telecommunications from 4G networks to 5G provides many opportunities for mobile operators. However, with high bandwidth, ultra-low latency, and ...
Home Router…, or Trojan Horse?
Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store ...