interview with Jason Cook
A global expert on security explains six key motivators that are driving enterprises
and telecoms to strengthen their security protection.
interview with Steven Shalita
Network forensics enables investigators to reconstruct and analyze network activity.
But automated packet-to-event translation could make forensics widely accessible
to non-technical investigators. The article explains: the new visual playback
paradym; changes in packet storage strategy; and the vision of a single instrumentation
instance driving multiple assurance applications.
by James Heath & Paul Scanlon
A Denial of Service (DoS) attack is a cyber-security breach that uses a tsunami
of data to overwhelm an enterprise’s connections, stopping it from communicating
or doing business online. This article explains why DoS and other security
matters are coming to a head as LTE and IP expand. Here you’ll also
learn the reasons why telecoms are becoming key security partners with enterprises.
interview with James Heath & Steve Shalita
The arrival of LTE, the all-IP wireless standard, greatly complicates
the guaranteee of service quality and security. This article details of
the many challenge and reasons why additional investments will be required to
remain secure. Fortunately a saving grace is proposed: a single Network
Behavioral analysis (NBA) system for anomaly detection that serves the dual
missions of service assurance and cybersecurity.
interview with Sergio Pellizzari
The greatest security threat in telecom is not the careless Web surfer, but
the innocent misconfiguration of network elements like routers, switches, and
firewalls. This article delves into single-sign and explains how it’s
become a vital security measure. You’ll learn about the robustness
of carrier-grade vs. enterprise solutions and read examples of what can go wrong
without a proper single-sign on solution in place.