AT&T has announced plans to acquire AlienVault. The acquisition looks like a strong reaffirmation of AT&T’s commitment to the enterprise security market.
A joint White Paper published by HardenStance partner, the Cyber Rescue Alliance, and Nokia entitled "Cyber Security In The Boardroom". Download the White Paper
Unless 5G security options are diverse, customizable and transparent, enterprise CSOs won’t sign-off on new 5G use cases on the scale that telcos are hoping for. Download the White Paper
Buyers and vendors of network security products should actively embrace and support NetSecOPEN as its disruptive and transparent approach can enhance the network security ecosystem.
I participated in this March 13th 2018 Light Reading webinar with Nokia discussing new approaches to leveraging analytics and router infrastructure for DDoS protection. Click on this link for the archived webinar.
Introducing the first in a new series of "Cyber Security Innovators" reports. This first one is on KPN, the Dutch telecom operator
HardenStance attended Cybertech in Tel Aviv last week. Here’s a Briefing on the current state of the Israeli market in cyber security start-ups
Runtime protection is now a bigger concern for Twistlock's customers than vulnerability management. Just one of the things I learnt when I met up with Dima Stopel, one of the company's Co-Founders, at CyberTech in Tel Aviv last week
Report for Analysys Mason: Cyber-Security Services For Large Enterprises: Opportunities For Operators
Access to the new report I've researched and written for Analysys Mason
A Nokia White Paper I wrote for Heavy Reading looking at a new model for leveraging data analytics and an operator's router infrastructure to protect against DDoS attacks. https://pages.nokia.com/T001OQ-Deepfield.html
On November 27th 2017, Akamai completed the acquisition of leading DNS provider, Nominum. Download the HardenStance take on how Akamai plans to leverage the acquisition of Nominum across its portfolio and drive its cybersecurity business to $1 billion in 4-5 years....
I participated in a Light Reading webinar with Clavister discussing how software design principles impact the performance of security applications as telecom operators virtualize their networks. Click on this link for the archived webinar.