& cplSiteName &
By Carol Wilson, Editor-at-large, 12/29/2015
Much of my work in the past year has been on Light Reading events, so it's not surprising that some of my most memorable moments of 2015 happened on the stages I helped set. Here's a look ...
By Carol Wilson, Editor-at-large, 12/22/2015
As last week's news clearly shows, there are constantly new threats to the telecom network and the technology on which it's built. The most serious of those seems to be the compromise of ...
By Carol Wilson, Editor-at-large, 12/17/2015
The growth of polymorphic attacks, which change over time or use one kind of attack to mask another, is forcing the telecom industry to reshape its view of cyber security to be broader in ...
By Carol Wilson, Editor-at-large, 12/16/2015
Heavy Reading Chief Analyst Patrick Donegan defends network security experts as being more able to properly assess the risk of change than top carrier management.
By Carol Wilson, Editor-at-large, 12/15/2015
Managed security services can handle the complexity of network security, while giving enterprises information they need for strategic decisions.
By Carol Wilson, Editor-at-large, 12/11/2015
As an industry, security folks tend to play things close to the vest, but increasingly they need to be sharing information in the fight against a common enemy.
By Carol Wilson, Editor-at-large, 12/10/2015
Most enterprises today don't know where their most critical data is stored or how it moves through their networks, making controlling risks much harder.
By Carol Wilson, Editor-at-large, 12/9/2015
Manufacturing and production environments as well as critical infrastructure are being targeted by polymorphic attacks intended to embarrass.
By Carol Wilson, Editor-at-large, 12/8/2015
Matching workloads or apps with their own security, provisioned alongside in a mixed-cloud environment, could make virtual networks safer.
By Carol Wilson, Editor-at-large, 12/7/2015
NEW YORK -- Even with growing concerns about security breaches, many enterprises aren't protecting their data adequately because they don't know where it resides within their IT structure ...
By Carol Wilson, Editor-at-large, 12/3/2015
NEW YORK -- The ideal security architecture for virtualized networks will be distributed, diverse and resilient, which means it will look a lot like a botnet, AT&T Chief Security Officer ...
Mobile Network Security Strategies Twitter Feed
Flash Poll
LRTV Documentaries
Leading Lights 2016 Highlights

5|25|16   |   02:26   |   (1) comment


Some of the high points from this year's Leading Lights awards dinner at the Hotel Ella in Austin, Texas.
LRTV Documentaries
Light Reading Hall of Fame 2016

5|23|16   |   05:43   |   (0) comments


Find out who has been welcomed into Light Reading's Hall of Fame this year.
LRTV Custom TV
ZTE TM Forum Highlights

5|23|16   |     |   (0) comments


ZTE showcased its new ICT solutions at TM Forum in Nice.
LRTV Interviews
Gamma's MD on the Emergence of UC2

5|20|16   |     |   (0) comments


Gamma Communications Managing Director David Macfarlane believes the unified communications (UC) market has reached a tipping point.
LRTV Custom TV
The Ultimate 5-Minute Guide to Digital Customer Engagement

5|20|16   |     |   (0) comments


In this short video, you will hear all about how Digital Customer Engagement is the key to meeting customer expectations, keeping them happy, and maximizing revenue. VP Product & Marketing at Pontis, Ofer Razon, breaks down for us the five essential capabilities for successful Digital Customer Engagement. Don’t miss!
LRTV Custom TV
NFV in 2016: Part 1 – NFV Use Cases Get Real

5|19|16   |   05:57   |   (0) comments


Consensus is building around the key use cases for NFV, including managed IP services at the network edge and on customer premises, which can generate new revenues from enterprises/SMBs and consumers; Evolved Packet Core to support LTE migration; and adjacent technologies, such as TAS and IMS, to support VoLTE and next-generation charging and policy control ...
LRTV Custom TV
Nokia's Steve Vogelsang on NFV – Part 3

5|19|16   |     |   (0) comments


Steve Vogelsang discusses the challenges of operational transformation and how Nokia helps its customers. Join Steve at the Big Communications Event in Austin the morning of May 24, on his keynote and optical networking panel.
LRTV Interviews
Level 3: Why UC Is In Demand

5|17|16   |   04:12   |   (1) comment


Andrew Edison, Level 3's senior VP of sales, EMEA region, talks about the drivers of growth in the unified communications services market.
LRTV Custom TV
ARM's OPNFV Action

5|17|16   |     |   (0) comments


At the ARM booth at MWC 2016, Joe Kidder and Bob Monkman speak to Light Reading about OPNFV and their upcoming action.
LRTV Custom TV
Nokia's Steve Vogelsang on NFV – Part 2

5|16|16   |     |   (0) comments


Steve Vogelsang gives advice to service providers on how to move to NFV. Join Steve at the Big Communications Event in Austin the morning of May 24, on his keynote and optical networking panel.
LRTV Interviews
Interoute CTO on NFV's Maturity

5|13|16   |   06:46   |   (1) comment


Matt Finnie, CTO at international operator Interoute, explains how NFV has made life easier in terms of logistics and how Interoute can now enable a 'software-defined moment' for its customers.
LRTV Huawei Video Resource Center
UBBS 2016 Highlights

5|12|16   |     |   (0) comments


Highlights of Huawei's UBBS event in Hong Kong.