x
Mobile Network Security Strategies
All News & Views
US Won't Work With Countries That Use Huawei, Pompeo Warns

US Secretary of State Mike Pompeo says risk posed by use of Huawei in critical IT systems could cause US to curtail the colocation of American resources, including embassies and military outposts.

Amid Global Turmoil, Huawei Still Counts at Least One American Supporter

While Huawei faces sales bans from carriers and governments worldwide, the company still counts at least one supporter: James Valley Telecommunications. 'I'm a believer in being innocent until proven guilty,' said the CEO.

Samsung's Top US Executive Is Leaving

Tim Baxter announced on social media he is retiring from the company and will be replaced by Young Hoon Eom.

Amoroso: Act Now on Virtualizing Security

The security industry has been talking about virtualizing security so it can be distributed to protect assets, but it's now time to start acting.

Demand, Virtualization Reshaping Security Landscape

There's a boom in security services, driven by demand from businesses and shaped by the ability to deliver security as a virtual network function.

Fixing IoT Security Is an Ecosystem Challenge

Level 3 Communications' Chief Security Officer Dale Drew says service providers, manufacturers and even consumers must combine to halt botnet woes.

Level 3's Drew Sees Liability Issues in IoT Botnets

Neither consumers nor device manufacturers are motivated to act to halt IoT-based botnets, but ISPs likely are and they are going to need help.

Amoroso: Expect Devastating US Cyber Attack

Former AT&T security chief urges telecom security industry to speak up now and insist on greater understanding of what's at stake and more resources.

Verizon: Unknown Assets a Hacker's Playground

M&A activity in particular helps fuel security problems when 'unknown' network resources are left unprotected.

Amoroso Not the Retiring Sort

AT&T's former security guru is taking his expertise to a much broader audience – and this time he's giving it away.

My Most Memorable Moments of 2015

Here's a look back at the highlights from the live events Light Reading held last year, including best keynote and best event.

Broad Threats Require Network-Based Security

Building on different tools including virtual functions, service providers are using the network itself as a security device.

Polymorphic Attacks Reshape Security Landscape

A review of network security threats shows growth in attacks that use DDoS and other methods as smokescreens for data breaches and extortion.

In Defense of the Security Team

Heavy Reading Chief Analyst Patrick Donegan defends network security experts as being more able to properly assess the risk of change than top carrier management.

Enterprises Seek Help on 'Day-to-Day' Security, Says Telefónica

Managed security services can handle the complexity of network security, while giving enterprises information they need for strategic decisions.

Facebook: Cultural Change Needed for Better Security

As an industry, security folks tend to play things close to the vest, but increasingly they need to be sharing information in the fight against a common enemy.

Level 3: Enterprises Have Frayed Approach to Data Protection

Most enterprises today don't know where their most critical data is stored or how it moves through their networks, making controlling risks much harder.

Verizon: Cyber Attacks Hit New Targets in New Ways

Manufacturing and production environments as well as critical infrastructure are being targeted by polymorphic attacks intended to embarrass.

AT&T's Amoroso: Taking Security to the Cloud

Matching workloads or apps with their own security, provisioned alongside in a mixed-cloud environment, could make virtual networks safer.

Level 3: Security Is Company-Specific

Enterprises need to know what their specific risks are and therefore what they need to protect and the best way to do that, says Level 3's SVP of security.

News & Views Archive
HOME
Sign In
SEARCH
CLOSE
MORE
CLOSE