& cplSiteName &
By Carol Wilson, Editor-at-large, 12/29/2015
Much of my work in the past year has been on Light Reading events, so it's not surprising that some of my most memorable moments of 2015 happened on the stages I helped set. Here's a look ...
By Carol Wilson, Editor-at-large, 12/22/2015
As last week's news clearly shows, there are constantly new threats to the telecom network and the technology on which it's built. The most serious of those seems to be the compromise of ...
By Carol Wilson, Editor-at-large, 12/17/2015
The growth of polymorphic attacks, which change over time or use one kind of attack to mask another, is forcing the telecom industry to reshape its view of cyber security to be broader in ...
By Carol Wilson, Editor-at-large, 12/16/2015
Heavy Reading Chief Analyst Patrick Donegan defends network security experts as being more able to properly assess the risk of change than top carrier management.
By Carol Wilson, Editor-at-large, 12/15/2015
Managed security services can handle the complexity of network security, while giving enterprises information they need for strategic decisions.
By Carol Wilson, Editor-at-large, 12/11/2015
As an industry, security folks tend to play things close to the vest, but increasingly they need to be sharing information in the fight against a common enemy.
By Carol Wilson, Editor-at-large, 12/10/2015
Most enterprises today don't know where their most critical data is stored or how it moves through their networks, making controlling risks much harder.
By Carol Wilson, Editor-at-large, 12/9/2015
Manufacturing and production environments as well as critical infrastructure are being targeted by polymorphic attacks intended to embarrass.
By Carol Wilson, Editor-at-large, 12/8/2015
Matching workloads or apps with their own security, provisioned alongside in a mixed-cloud environment, could make virtual networks safer.
By Carol Wilson, Editor-at-large, 12/7/2015
NEW YORK -- Even with growing concerns about security breaches, many enterprises aren't protecting their data adequately because they don't know where it resides within their IT structure ...
By Carol Wilson, Editor-at-large, 12/3/2015
NEW YORK -- The ideal security architecture for virtualized networks will be distributed, diverse and resilient, which means it will look a lot like a botnet, AT&T Chief Security Officer ...
Mobile Network Security Strategies Twitter Feed
Flash Poll
LRTV Custom TV
Energy 2020: Growing Services, Not Consumption

6|24|16   |   07:18   |   (0) comments


Management of power requirements needs to be a key consideration as cable operators deploy new services, says Dan Cooper, vice president of critical infrastructure for Charter Communications and chair of the SCTE/ISBE Standards Program's Energy Management Subcommittee. In this video, Cooper discusses the importance of cable operators and technology partners ...
LRTV Huawei Video Resource Center
Huawei & TDC First to Launch DOCSIS 3.1 Trial in Europe

6|24|16   |     |   (0) comments


To meet the rising demands for high-speed broadband and to tackle fierce competition for 1.5 million household, TDC wanted to upgrade its network to use the latest technology. Using Huawei's DOCSIS 3.1 solution, TDC is now able to offer gigabit speeds to its customers.
LRTV Documentaries
OPNFV Summit: Key Takeaways

6|22|16   |   03:28   |   (0) comments


MANO shortfalls, an increasingly bloated open source ecosystem and the cultural challenges for network operators were among the key takeaways from the OPNFV Summit in Berlin.
LRTV Huawei Video Resource Center
Bringing Ultra Broadband to the South Pacific

6|22|16   |   7:55   |   (0) comments


At Singapore's UBBS 2016 summit, Light Reading speaks to Lim Chee Siong, Huawei's CMO in the South Pacific Region.
LRTV Custom TV
Juniper's NFV Platform

6|22|16   |     |   (0) comments


A telco cloud is a key enabler for service providers to deliver virtualized services to their customers. Juniper has a differentiated approach with an open and comprehensive NFV platform to build the cloud of the future for multiple use cases.
Women in Comms Introduction Videos
Infinera: The Glass Ceiling's Been Broken

6|22|16   |   4:34   |   (0) comments


Shannon Williams, an engineer by trade and now the director of sales for Infinera's major accounts, draws confidence from being a female in a male-dominated industry and hopes other women will too as industry dynamics swing in our favor.
LRTV Custom TV
RAD Demonstrates SD-WAN Functionality at BCE 2016

6|22|16   |     |   (0) comments


In conjunction with Versa Networks, RAD demos a joint solution for SD-WAN implementation. The solution uses RAD's ETX-2i, a vCPE platform integrating a powerful IP and Carrier Ethernet NID/NTU with a field-pluggable x86 NFV module that runs Versa's FlexVNF for SD-WAN functionality. The demo implements SD-WAN over a simulated service provider footprint by deploying ...
LRTV Custom TV
Radware on Virtualizing Network Security

6|21|16   |     |   (0) comments


Radware's Michael O'Malley highlights the benefits for service providers of virtualizing network security.
LRTV Huawei Video Resource Center
Huawei 2016 UBBS World Tour: Singapore

6|21|16   |   02:39   |   (0) comments


Highlights from Huawei's UBBS World Tour event in Singapore.
LRTV Custom TV
The FlowBROKER Solution

6|21|16   |     |   (0) comments


During a demo at the Big Communications Event 2016, Accedian director of product line solutions Greg Spear demonstrates how the FlowBROKER distributed packet capture solution (part of Accedian's SkyLIGHT platform) can be used to troubleshoot and resolve QoE issues.

FlowBROKER is the industry's first lossless remote packet capture solution, which uses ...

LRTV Documentaries
BCE 2016: Dell & the New World Order

6|21|16   |   22:48   |   (0) comments


Dell's Jim Ganthier on how the very essence of enterprise is being affected by digital disruption – and how the cloud can help companies find a path forward.
LRTV Documentaries
BCE 2016: The CSP of the Future

6|20|16   |     |   (0) comments


Traditional telecom operators have been adopting new ways of doing business from the IT sector and emulating web-scale companies in their technology adoption. Are these strategies succeeding? A panel of experts at BCE considered the evidence...