From the Flu to DDoS – an Epidemic of Epidemics!

Last week, while the mobile industry was busy celebrating telecom innovation at MWC18, another kind of innovation was making headlines: a record 1.35 Tbps DDoS attack was launched (and it has already been surpassed), causing some disruption and highlighting the potential for much worse. In this instance, the attack was detected and mitigated relatively quickly—but…

What’s Happening at the Mobile World Congress, Barcelona 2018

Yes, the new year is well underway and it’s time for the highlight of the mobile industry’s calendar—the Mobile World Congress in Barcelona. GSMA claims that this year’s event is bigger and better than any before with delegates from all four corners of the globe looking to learn about the latest and greatest developments in…

The Economics of Home IoT Cyber Crime

IoT devices in the home are increasingly being targeted by cyber criminals. This can lead to invasions of personal privacy as well as attacks on Communications Service Providers (CSPs) and IoT vendor property and infrastructure. It is likely that this trend will continue with attacks becoming more widespread and sophisticated. The past five years has…

New Report Reveals How Tier-1 Mobile Operators Increase ARPU and Customer Satisfaction in Today’s Competitive Environment

3 tangible benefits Communications Service Providers can derive from becoming Masters of Security The ancient quote from Heraclitus: “The Only Thing That Is Constant Is Change” is as relevant today as it ever were. It is certainly very pertinent to the Telecommunications industry. In fact, it’s never boring working in the telecom industry because things…

Time for Service Providers to Become “Masters of Security”

US Government Acting against Cybersecurity Threats.  While palming off incidences of Fake News like they were annoying bugs, US President Trump is taking cyber-attack threats much more seriously. On May 11, 2017, the President issued Executive Order 13800, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure”. The US Department of Commerce, Homeland Security Release…

2018 Predictions: Will Technology Deliver on its Promise in 2018?

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

Are you caught in the Bitcoin “gold rush” but is someone else reaping the rewards?

Seems like everyone has been talking about Bitcoin lately. If you remember the dot com boom of the late nineties like I do, you might have a slight feeling of deja vu. But whether we are facing a bubble or not, one thing learned recently while doing some network data analysis, is that a new…

Security, Security, Security: The Top Three IoT Challenges Confronting CSPs

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When it comes to IoT (Internet of Things), CSPs should pay particular attention to the 3 S’s: Security, Security, Security. Unless internalized, there could be some real heartache coming to…

IoT Security: Threat to an Opportunity

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth as the adoption of connected devices begins to outstrip that of mobile handsets.  From fleet tracking telemetry to home alert systems, the use cases have been endless and many…

Securely Mapping Africa’s Digital Future

The latest cyber-security proposals and guidelines for Africa have proven the need for a unified security strategy across both the public and the private sector, with this being shown across multiple regions, networks and industries. As one of the largest growth areas in the world, the guidelines make a point of discussing how integral it…