Allot_MWC2019

The top telco conferences and trends shaping our future

For those of you that may not know about Allot, we’re a leading provider of cybersecurity solutions for communication service providers and innovative network intelligence for both service providers and enterprises all ...
security

Hello, 5G. Goodbye, Passwords: Predictions for the New Decade

What will security look like in the third decade of the 21st century? Here are a few preductions As we approach a new decade, it’s fun to look back at what the ...
Security Boulevard
mobile strategy

Lack of Mobile Strategy Creates Security Holes

How a security-focused mobile strategy can help organizations stay safe in their digital transformation efforts and beyond The focus of many organizations’ digital transformation has been on mobile devices. Employees depend on ...
Security Boulevard
The importance of trust in leading a market transition

The importance of trust in leading a market transition

As I wrote in my book Connecting the Dots, trust is one of a company’s two most important assets (the other is information). For a company looking to lead a market transition, ...
Glass Class: CASB vs SWG

Glass Class: CASB vs SWG

For many years, organizations have been using secure Web gateways (SWGs) to protect against malware and malicious websites very successfully. However, as cloud applications become more popular, a change in security strategy ...
A Flawed Network, By Any Other Name...

A Flawed Network, By Any Other Name…

via Lily Hay Newman, writing for Wired Magazine, comes this outstanding piece on the extant tally of known flaws within deployments of 5g networking hardware infrastructure. H/T '"The thing I worry about ...
Mjellma

What We Need To Know About Bluetooth Security

Since its introduction in the early 2000s, Bluetooth technology has been helping people to connect their devices and share data seamlessly. Wireless microphones and headphones, for example, are there because of Bluetooth ...
5 Ways to Avoid a Ransomware Attack

5 Ways to Avoid a Ransomware Attack

“Ooops, your files have been encrypted!” That’s the dreaded message that greeted people hit with the 2017 WannaCry ransomware attack. Hundreds of thousands of computers were infected and many people lost their ...
What is the CIA Triad: Confidentiality, Integrity, & Availability

What is the CIA Triad: Confidentiality, Integrity, & Availability

Visibility & Control: The keys to the kingdom of information security and network function integrity Ask any security practitioner how to start designing network infrastructure for security and they will tell you ...
A quick update on 2019 mobile predictions made in January.

A quick update on 2019 mobile predictions made in January.

So far this year, the surreptitious capture of audio and visual data via smartphone cameras and microphones has negatively impacted the world’s richest person and a beloved trillion-dollar company. It’s safe to ...