Please turn on your JavaScript for this page to function normally.
5G
Despite COVID-19, 5G progress in connections and deployments continues

5G progress in connections and deployments continues despite the COVID-19 pandemic and resulting economic downturn according to 5G Americas. According to data from Omdia, …

remote work
With remote working on the rise, infosec strategies need to evolve

The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having …

DDoS
How the pandemic affected DDoS attack patterns, global internet traffic

There has been a shift in internet traffic patterns coinciding with an increase in DDoS and other types of network attacks in recent months as organizations across industries …

5G
5G subscriptions to top 190 million this year, 2.8 billion by the end of 2025

The global number of 5G subscriptions to top 190 million by the end of 2020 and 2.8 billion by the end of 2025, according to a report by Ericsson. The report also takes an …

cloud
The impact of SD-WAN for securing public cloud adoption

While adoption rates for public cloud continue to grow, security is still the number one roadblock, which is understandable considering the volume and variety of threats …

gap
What is the true extent of the modern corporate digital attack surface?

RiskIQ released a report analyzing the company’s internet-wide telemetry and massive internet data collection to reveal the true extent of the modern corporate digital …

face
Bad habits and risky behaviors put corporate data at risk

IT and application development professionals tend to exhibit risky behaviors when organizations impose strict IT policies, according to SSH. Polling 625 IT and application …

5G
5G adoption, security and worldwide market trends

With 5G adoption ramping up all over the world, we sat down with Chris Pearson, President of 5G Americas, to learn more about the current 5G landscape. 5G Americas is an …

Jason Coder
A math formula could help 5G networks efficiently share communications frequencies

Researchers at the National Institute of Standards and Technology (NIST) have developed a mathematical formula that, computer simulations suggest, could help 5G and other …

zero
Why is SDP the most effective architecture for zero trust strategy adoption?

Software Defined Perimeter (SDP) is the most effective architecture for adopting a zero trust strategy, an approach that is being heralded as the breakthrough technology for …

5G
Operators rethinking security while making rapid progress toward 5G

Mobile service providers say they are making substantial progress toward ushering in a new generation of 5G networks that will enable ultra-high-speed mobile connectivity and …

traffic
In an increasingly 5G and edge world, DNS matters

Infoblox identified the challenges Communication Service Providers (CSPs) face in transitioning to distributed cloud models, as well as the use cases for multi-access edge …

Don't miss

Cybersecurity news