Technology & Solutions
Runtime protection is now a bigger concern for Twistlock's customers than vulnerability management. Just one of the things I learnt when I met up with Dima Stopel, one of the company's Co-Founders, at CyberTech in Tel Aviv last week
A Nokia White Paper I wrote for Heavy Reading looking at a new model for leveraging data analytics and an operator's router infrastructure to protect against DDoS attacks. https://pages.nokia.com/T001OQ-Deepfield.html
On November 27th 2017, Akamai completed the acquisition of leading DNS provider, Nominum. Download the HardenStance take on how Akamai plans to leverage the acquisition of Nominum across its portfolio and drive its cybersecurity business to $1 billion in 4-5 years....
I participated in a Light Reading webinar with Clavister discussing how software design principles impact the performance of security applications as telecom operators virtualize their networks. Click on this link for the archived webinar.
In October 2017 I participated in a Light Reading webinar on security infrastructure scalability with Intel and Sandvine . Click on the above link to access the archived webinar
In September 2017 I wrote this Heavy Reading White Paper for Nokia on security requirements for Multi access Edge Computing (MEC) . Click on the above link to download.
In June 2017 I published this Heavy Reading White Paper for AT&T on threat intelligence. Click on the above link to download.
Patrick Donegan's first report for Analysys Mason. "Cyber Security Services For Small & Medium Sized Enterprises: Opportunities For CSPs"
There’s a boom in security services, driven by demand from businesses and shaped by the ability to deliver security as a virtual network function, says Heavy Reading Chief Analyst Patrick Donegan. With that increased demand comes increased competition, as more different types of service providers including equipment vendors are getting into the business of offering security.
Distributed denial-of-service (DDoS) attacks pose a serious threat to the communications service provider (CSP) business model. DDoS attacks generate network outages that suspend the ability to bill for service; they are often launched in conjunction with data exfiltration attacks; they trigger penalties for breaches of service-level agreements (SLAs); and they put upward pressure on customer churn.