Category Archives Cybersecurity

In late 2024, the telecommunications industry was rocked by one of the most sophisticated cyber espionage campaigns in recent memory. The Salt Typhoon attack infiltrated at least eight major U.S. telecom providers, including AT&T, Verizon, Lumen, and others. The attacks compromise devices like routers, switches and firewalls, gaining undetected access to sensitive communications, including those of government […]

Businesses must embrace a new reality with agility that can transform operations, with security a top priority. SASE (secure access service edge) can help. In this sequel blog, we share the market drivers, business benefits SASE delivers, and related use cases. Employees around the world have decided they’d like to work from home, thank you […]

Open security device testing is on a roll, supporting unbiased vendor testing and certification. Based on popular demand, NetSecOPEN is expanding its portfolio of open security tests to address real-world conditions. The initial debut of NetSecOPEN’s open network security product testing has been a success, with a range of products undergoing testing and certification. The […]

In the midst of this COVID-19 pandemic, cyber-criminals are targeting individuals as well as companies. Learn a few quick recommendations about how to protect you, your family and your business. We receive more information everyday about the growing incidence of cyber-criminals trying to profit from the challenging global situation created by the coronavirus outbreak. The […]

Cloud-native architectures, 5G Standalone, and open APIs are converging to define a new era of telecom. Explore strategies for delivering seamless user experiences and building monetization-ready networks. Service providers are ready to reap the business benefits of cloud-native infrastructures to realize more flexibility and higher performance. But they understand challenges lurk in the way of […]

How to address three emerging cybersecurity threats poised to wreak network havoc, with a focus on AI, ZTNA, and PQC. The urgent pace of technological change is sending tsunami-sized ripples through every aspect of how networks are built and managed. This is especially true when it comes to threat landscapes. Cyber adversaries are growing more […]

Threat actors are leaning on Application Layer DDoS attacks to achieve their malicious goals. Learn how DDoS attack emulation can help validate cyber defenses and assess the performance and security posture strength of an organization’s networks and devices against these pervasive, destructive campaigns. DDoS Threat Landscape The latest DDoS threat landscape reports indicate that Application Layer […]

New risks are on the rise for telecom networks, Having the right security solution in place as early in the development phase as possible is required. The proactive security strategies should include a focus on the role of DevSecOps, Zero Trust, and AI/ML to address the fast-approaching challenges of the near future. Telco networks are […]

Network security architectures are changing. We’ll examine an emerging new architecture called Zero Trust Network Access and how it helps ensure data safety and integrity and enables the transformation from a static, data-centric approach to a more dynamic, policy-based one. You’ll learn about the benefits of the Zero Trust approach and related validation solutions. Typical […]

Realism in traffic patterns paired with modern KPI measurements are critical for testing and assessing network scale. Learn about testing strategies for implementing this in practice by measuring the true scalability and effects on the device or network under test. To test with highly realistic traffic patterns, we need to step back and focus on […]

Close