An immediate opportunity for CSP’s to increase IoT revenue

IoT devices are expected to exceed mobile phones as the largest category of connected devices in 2018, giving shrewd mobile operators a lot to benefit from. Unlike smartphones whose appetite for data grows every year, IoT devices such as those used to monitor the health of a car engine or for billing water or electricity…

Biting the Hand that Feeds You: When IoT-Based Attacks Strike Service Providers

While we’re arming ourselves, our businesses and organizations against IoT-based attacks, few people talk about the damage they do to service providers. It’s something that gets overlooked, but the potential for causing detrimental impact is considerable. Service providers can suffer particularly badly because: They can be a target Attacks can originate from within their own…

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods

The DDoS Education Series Part 4/4: The Overwhelming Scope of DNS Floods The first two instalments of this series covered TOS Floods and SYN Floods, while last time, we focused our attention on Ping Floods. This final instalment in the education series looks at DNS Floods, what differentiates them from other kinds of DDoS attacks, and…

The DDoS Education Series Part 2/4. Are You SYN-fully Unprotected Against the Latest DDoS Threats?

Last time, we introduced DDoS attacks, and highlighted the threat of TOS Floods. This time, we turn our attention to SYN Floods. What are the risks for service providers, and how can you stay ahead of the game to keep yourself and your customers safe? Hackers Back in the Spotlight Cybersecurity Ventures   predicted that “global spending…

How Israel’s Tech Experience Can Protect “Smart Cities”

What can cities worldwide learn about urban network security from Israel’s technology and expertise? As civic infrastructure has become more connected and cities have become “smarter”, safeguarding urban security increasingly involves developing and applying cyber defense technology and the analysis of big data. And they need prevention and security technology to keep pace with a…

Why Your Firewall Needs a Multilayer Inline Solution for DDoS Protection

Deploying a multilayered inline solution stops your firewall from becoming the weakest link in your network security during massive DDoS attacks, and keeps critical network services running. Firewalls and intrusion prevention systems (IPS) have become a standard in network protection, installed in every network. Although they have greatly advanced over the years in safeguarding against…