Telia Carrier

DDoS attacks are up, with ever-greater network impact
Telia Carrier has announced the findings of a report with a perspective on today’s cyber threats from traffic data. The report investigates changes in attack vector, size and …

Business leaders now feel more vulnerable to cyber attacks
45% of business leaders claim that their company has experienced more network security incidents as a result of the pandemic, according to a new survey from Telia Carrier. …
Cisco helps service providers and web scale companies offer a more accessible internet
Cisco announced its strategy to help communication service providers and web scale companies around the world connect, secure and automate their networks to deliver a …

Biggest WAN pain points: Security and service flexibility
Corporate WANs are failing to deliver on businesses’ priorities, with 55% of respondents citing security is the biggest pain point, 43% service flexibility, 36% supplier …
Telia Carrier’s new global service expands its SD-WAN solution portfolio
Telia Carrier launched its advanced SD-WAN service, an end-to-end networking solution that provides superior visibility, agility and control beyond the traditional WAN …
Telia Carrier implemets RPKI, reducing the risk of accidental route leaks
Telia Carrier has announced, that it has implemented RPKI – a technology that validates and secures critical route updates or BGP announcements on its #1 ranked global …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility