& cplSiteName &
By Carol Wilson, Editor-at-large, 9/8/2016
When most male executives retire from a long-time job, they brush up their golf game, plan exotic travel, tackle the "honey do list" or find a beach somewhere to just sit.
By Carol Wilson, Editor-at-large, 12/29/2015
Much of my work in the past year has been on Light Reading events, so it's not surprising that some of my most memorable moments of 2015 happened on the stages I helped set. Here's a look ...
By Carol Wilson, Editor-at-large, 12/22/2015
As last week's news clearly shows, there are constantly new threats to the telecom network and the technology on which it's built. The most serious of those seems to be the compromise of ...
By Carol Wilson, Editor-at-large, 12/17/2015
The growth of polymorphic attacks, which change over time or use one kind of attack to mask another, is forcing the telecom industry to reshape its view of cyber security to be broader in ...
By Carol Wilson, Editor-at-large, 12/16/2015
Heavy Reading Chief Analyst Patrick Donegan defends network security experts as being more able to properly assess the risk of change than top carrier management.
By Carol Wilson, Editor-at-large, 12/15/2015
Managed security services can handle the complexity of network security, while giving enterprises information they need for strategic decisions.
By Carol Wilson, Editor-at-large, 12/11/2015
As an industry, security folks tend to play things close to the vest, but increasingly they need to be sharing information in the fight against a common enemy.
By Carol Wilson, Editor-at-large, 12/10/2015
Most enterprises today don't know where their most critical data is stored or how it moves through their networks, making controlling risks much harder.
By Carol Wilson, Editor-at-large, 12/9/2015
Manufacturing and production environments as well as critical infrastructure are being targeted by polymorphic attacks intended to embarrass.
By Carol Wilson, Editor-at-large, 12/8/2015
Matching workloads or apps with their own security, provisioned alongside in a mixed-cloud environment, could make virtual networks safer.
By Carol Wilson, Editor-at-large, 12/7/2015
NEW YORK -- Even with growing concerns about security breaches, many enterprises aren't protecting their data adequately because they don't know where it resides within their IT structure ...
Mobile Network Security Strategies Twitter Feed
Flash Poll
LRTV Custom TV
Introducing IoT World News

9|27|16   |   01:43   |   (0) comments


Self-driving cars, medical sensors, smart cities... and refrigerators. In order to address the huge scope of IoT, KNect365 has created a unique online community that will help businesses to understand and monetize the opportunities that live within the IoT market. We look forward to welcoming you to IoT World News -- your gateway to a better connected future.
LRTV Interviews
AT&T: Re-usable Functions Next NFV Key

9|27|16   |   06:03   |   (0) comments


The next generation of NFV has to break functions down into re-usable software chunks, making everything much more cloud-like.
LRTV Interviews
Masergy on Security: Attackers Gaining Upper Hand

9|27|16   |   5:10   |   (2) comments


At Light Reading's NFV & Carrier SDN event in Denver, Ray Watson, vice president of Global Technology at Masergy, says that because of the growth in virtualization, the threat landscape is shifting in favor of the attackers. As a result, service providers need to think beyond just defending the perimeter and take a more holistic approach to security.
LRTV Interviews
Verizon Takes Next Step on Biz Virtualization Journey

9|26|16   |   4:38   |   (2) comments


At September's NFV & Carrier SDN event in Denver, Light Reading sat down with Victoria Lonker, director of Product and New Business Innovation at Verizon, to chat about where the carrier is with delivering virtualized services to business customers.
LRTV Interviews
Global Services: The $40B Face-Off

9|26|16   |   05:53   |   (1) comment


More service providers than ever before are battling it out to win a slice of what is now a $40 billion global communications services pie, explains Ovum Principal Analyst David Molony.
LRTV Documentaries
MEC Congress: The Key Takeaways

9|22|16   |   03:25   |   (3) comments


Three key takeaways from the Mobile Edge Computing (MEC) Congress in Munich, Germany.
Wagner’s Ring
Time to Shut Up About 'Dumb Pipes'

9|22|16   |     |   (12) comments


Service providers can't compete with OTT players. It just isn't in their DNA. Instead, service providers need to embrace what they're good at -- providing reliable, secure connectivity.
Wagner’s Ring
Keeping Your Tech Career Going After 50

9|21|16   |     |   (13) comments


How do you keep your career moving forward when you're past the half-century mark?
LRTV Interviews
Peering Into the Digital Future

9|20|16   |   04:25   |   (0) comments


Nick Thomas, practice leader of digital media at Ovum, talks about how digital transformation in the technology, media and telecom sectors will enable the development of a new range of applications and services for enterprises and consumers and how the upcoming Digital Futures event in London will examine ...
LRTV Custom TV
Napatech Tackles NFV's Major Challenge

9|7|16   |   08:42   |   (0) comments


One of the main challenges for network operators introducing NFV is to combine performance and flexibility in a cost-effective way, but there is a solution, explains Napatech's Dan Joe Barry.
LRTV Custom TV
Huawei Optical Innovation 2016

9|6|16   |     |   (0) comments


Highlights of the 2016 Huawei Optical Innovation forum.
LRTV Huawei Video Resource Center
Are You Ready for Huawei Connect 2016?

8|31|16   |     |   (0) comments


Join us for an exclusive sneak peak of Huawei Connect, an integrated conference for the global ICT ecosystem taking place in Shanghai.