
5G services roaming subscribers to reach 210 million in 2026
The global number of roaming subscribers using 5G services will increase from 4.5 million in 2021 to 210 million in 2026, according to Juniper Research. As the international …

What should IT leaders look for in an SD-WAN solution?
The phrase “game-changing” has become almost overused in recent years, particularly in the world of tech. To an extent, this reflects the degree of constant innovation taking …

Manufacturers turning to zero trust to better secure their networks
In response to the 62% global increase in ransomware since 2019 (158% increase in North America) and over 40% of manufacturing firms suffering a cyberattack last year, Onclave …

DDoS attacks are up, with ever-greater network impact
Telia Carrier has announced the findings of a report with a perspective on today’s cyber threats from traffic data. The report investigates changes in attack vector, size and …

IoT malware attacks rose 700% during the pandemic
Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The …

What drives SDN adoption?
U.S. enterprises are looking to software-defined networking (SDN) providers to help them increase their agility and flexibility and enable remote working after the COVID-19 …

Fraudulent content has a direct impact on consumer loyalty
Scams accounted for 59% of blocked user-generated malicious content during the first quarter of the year, according to a Sift report. The report examines how weaponized …

What are the traits of individuals more likely to demonstrate trolling behaviors?
As social media and other online networking sites have grown in usage, so too has trolling – an internet practice in which users intentionally seek to draw others into …

5G coverage now extends to 1662 cities across 65 countries
Viavi Solutions released a research demonstrating the accelerating pace at which 5G is growing, with coverage extending to an additional four countries and 301 cities …

Finding the right SD-WAN in a crowded market
Software-defined wide area networks (SD-WAN) have become a staple for large organizations, helping them better communicate and interact with each other across the globe. But …

Worldwide wireless 5G connections reach 298 million in Q1 2021
The state of the race for the fifth generation of wireless (5G) subscriber adoption has tightened up significantly, as global wireless 5G connections for Q1 2021 reached 298 …

How mobile operators view security in the 5G era
There’s a major gap in security capability among mobile operators, which in many cases is not yet being filled by industry partnerships, Trend Micro reveals. In the 5G …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility