Posts By VIAVI Staff

As a founding member of NetSecOPEN, Active participant in the NetSecOPEN forum, driving new methodology specifications. Read about best practices for validating network performance and security efficacy with open standards. NetSecOPEN is a non-profit organization with the mission to establish open standards in performance security testing. These efforts have evolved significantly with the ratification of RFC […]

Complex, advanced cyber threats are emerging every day. Learn how to assess the performance and security strength of your organization against the latest attacks, including malware and ransomware. On June 30 2023, Bloomberg reported that cybercriminals, known as ALPHV or BlackCat, breached one of UK’s largest hospital groups, threatening illegal public release of their confidential data. […]

Read how 10BASE-T1S Ethernet delivers new benefits making it highly suitable for a broad range of automotive applications, including sensors and actuators across multiple domains. The automotive industry is currently undergoing a major transformation, driven by significant megatrends such as electrification, connectivity, autonomous driving, and shared mobility. Car manufacturers are challenged to quickly adapt their […]

Financial institutions rely on their digital infrastructure for conducting financial transactions and providing services to their customers; it’s important to ensure their networks are secure, reliable, and perform as planned to their specific needs. Financial institutions must have a strong and comprehensive assessment and validation strategy to maintain security, performance, and access in current architectures, […]

Threat actors are leaning on Application Layer DDoS attacks to achieve their malicious goals. Learn how DDoS attack emulation can help validate cyber defenses and assess the performance and security posture strength of an organization’s networks and devices against these pervasive, destructive campaigns. DDoS Threat Landscape The latest DDoS threat landscape reports indicate that Application Layer […]

Secure Access Secure Edge (SASE) and Zero Trust (ZT) represent a critical evolutionary step for ensuring holistic SD-WAN security in the post-Covid multi-cloud environment – ‘Secure SD-WAN.’ Learn why a comprehensive test and validation strategy is essential to ensure Secure SD-WAN’s promise of being the ‘on-ramp of choice to the cloud’ for a growing number […]

New risks are on the rise for telecom networks, Having the right security solution in place as early in the development phase as possible is required. The proactive security strategies should include a focus on the role of DevSecOps, Zero Trust, and AI/ML to address the fast-approaching challenges of the near future. Telco networks are […]

Enterprise security management was never easy. But now a confluence of new realities is making it harder than ever to keep a step ahead of bad actors. Learn about the latest community efforts to level the security testing playing field. The office perimeter now knows no bounds, stretching to couches and coffee shops as workers […]

5G is introducing tight integration with satellites to expand high-speed coverage into hard-to-reach areas and support maritime applications. This presents a whole new set of challenges for satellite transceiver performance. Next-gen network deployments are ramping up around the world, but there is more to 5G than land-based New Radios and the new Packet Core. 5G […]

Learn how to use HTTP/3 to build your next-generation web using CyberFlood, the only solution that proactively validates network performance and security with emulated HTTP/3 traffic. HTTP (HyperText Transfer Protocol) was released in 1991 and it essentially powers the exchange of information over the web today. Since then, there have been several updates to HTTP […]

Close