2018 Predictions: Will Technology Deliver on its Promise in 2018?

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

DPI: Enabling secure, personalized and metered services

Why Deep Packet Inspection may be the key to enabling secure, personalized and metered services, should the FCC decide to end net neutrality in the USA. And isn’t it ironic?* It’s like spamming the FCC with bot driven anti net neutrality comments. It’s like a DDoS attack keeping anyone from commenting on it OK maybe…

Are you caught in the Bitcoin “gold rush” but is someone else reaping the rewards?

Seems like everyone has been talking about Bitcoin lately. If you remember the dot com boom of the late nineties like I do, you might have a slight feeling of deja vu. But whether we are facing a bubble or not, one thing learned recently while doing some network data analysis, is that a new…

Big Online Bargains Mean Big Online Threats. Who’s Most at Risk during Black Friday?

If you’re an online bargain hunter like me, this upcoming weekend provides an abundance of deals you won’t want to miss out. In fact, this year’s Cyber Monday will be the biggest online shopping day in history, according to Adobe — generating $6.6 billion in expected sales. Between Black Friday, Sofa Sunday, and Cyber Monday,…

Network-based Security Services Give Mobile Operators a Competitive Edge

As the digital world becomes all-the-more pervasive, so does the threat landscape that accompanies it. To the average consumer this can be pretty scary. Everywhere they turn, there are horror stories about phones, tablets and computers being hacked; about thousands of dollars draining out of private bank and credit card accounts; about home and business…

Security, Security, Security: The Top Three IoT Challenges Confronting CSPs

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When it comes to IoT (Internet of Things), CSPs should pay particular attention to the 3 S’s: Security, Security, Security. Unless internalized, there could be some real heartache coming to…

BadRabbit: Is Three the Magic Number, or is this The New Normal?

Did you know that the damages from Ransomware are expected to be more than $5 billion by the year 2020? This is not just the cost of paying the ransom itself, but also the price of destruction and loss of data, the downtime involved getting systems back online, and the disruption to the business which…

IoT Security: Threat to an Opportunity

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth as the adoption of connected devices begins to outstrip that of mobile handsets.  From fleet tracking telemetry to home alert systems, the use cases have been endless and many…

Securely Mapping Africa’s Digital Future

The latest cyber-security proposals and guidelines for Africa have proven the need for a unified security strategy across both the public and the private sector, with this being shown across multiple regions, networks and industries. As one of the largest growth areas in the world, the guidelines make a point of discussing how integral it…

An immediate opportunity for CSP’s to increase IoT revenue

IoT devices are expected to exceed mobile phones as the largest category of connected devices in 2018, giving shrewd mobile operators a lot to benefit from. Unlike smartphones whose appetite for data grows every year, IoT devices such as those used to monitor the health of a car engine or for billing water or electricity…