Customer & Media Citations

Evolving The Mobile Security Architecture Towards 5G

Machine Learning at Heart of Security M&A Splurge

When in February 2017 four cyber security vendors acquired four malware detection vendors specialized in machine learning or behavioural analytics, Light Reading asked me what I thought about it.

Evolving The Mobile Security Architecture Towards 5G

Talking with Light Reading’s Carol Wilson at Light Reading’s Service Provider & Enterprise Security Strategies event in New York, December 2016

There’s a boom in security services, driven by demand from businesses and shaped by the ability to deliver security as a virtual network function, says Heavy Reading Chief Analyst Patrick Donegan. With that increased demand comes increased competition, as more different types of service providers including equipment vendors are getting into the business of offering security.

Evolving The Mobile Security Architecture Towards 5G

BlackHat’s Red Flags for CSPs

The vibe from the conference and exhibition floor at this year’s event in Las Vegas left this first-time attendee in no doubt that BlackHat is well and truly growing up. The spirit of subversive hackery that filled BlackHat’s attendee lists in the early days is certainly still there. But according to exhibitors and delegates alike there has been a clear shift in the attendee profile towards operational and commercial types charged with buying and implementing network security solutions for their businesses.

Evolving The Mobile Security Architecture Towards 5G

AT&T & AWS: Heavy Reading’s View

In a Light Reading column last July, I argued we were embarking on a new “Phase 3” in the commercial relationships between communications service providers (CSPs) and the web-scale Internet companies (WICs). I noted then that this new era would be “characterized by much closer collaboration.” (See Kevin Lo’s Move to Facebook: Sign of Things to Come?)

The Telecom Threat Intelligence Summit 2026

Register for free email notifications

Be first to get the latest reports from HardenStance.

Business email addresses only. All fields required.

Unless you also register for a HardenStance webinar or event, as a subscriber to reports your contact details will not be shared with any third party whatsoever.