Contributors   |   Messages   |   Polls   |   Resources   |  
Comments
Newest First | Oldest First | Threaded View
<<   <   Page 4 / 4
vnewman
vnewman
10/30/2017 10:56:10 PM
User Rank
Platinum
Re: Visibility & Vulnerability
Wow. I must say this article threw me for a loop. I expected to be reading about the measures ATT implements to secure its own customers but it looks as if ATT is making a push to get into the Cybersecurity game as a player. I suppose they have resources and infrastructure in place to make it a natural next step. Perhaps we will soon see them buying out a company like Cisco did with CloudLock.

50%
50%
Michelle
Michelle
10/30/2017 10:37:41 PM
User Rank
Platinum
Re: Point of Statistical Order
So we're looking at a "death by a thousand cuts" situation with security? Cyber crime as a service is apparently big business on the ol' dark webbbb. Bad guys are innovating all the time so the fight will only get more complicated.

50%
50%
ms.akkineni
ms.akkineni
10/30/2017 6:02:16 PM
User Rank
Platinum
Re: Point of Statistical Order
@afwriter:

Agree with you. You brought up a very good point. Adding more access points certainly are adding more prone areas for security. And we have seen substantial growth in introducing more accesspoints and that justifies.

50%
50%
afwriter
afwriter
10/30/2017 5:56:16 PM
User Rank
Platinum
Re: Point of Statistical Order
I think that it is a mixture of both but definitely, more about more access points than ever before and that number continues to rise. Of course, the more lucrative cybercrime becomes the more cybercriminals there will be, but it is going to become more lucrative because we are adding so many more access points in our lives from personal and industrial IoT to an ever increasing amount of connected mobile devices.

50%
50%
ms.akkineni
ms.akkineni
10/30/2017 4:39:57 PM
User Rank
Platinum
Visibility & Vulnerability
Because they see all these breaches reported on the news, the customers' primary concern is "I don't know what I don't know." It's possible to have a vulnerability exploited for months that customer didn't even know was there. That's what scares them the most. They want to increase visibility into their networks and identify their points of vulnerability.

This has been the primary concern of today's customers especially after the latest episodes of Equifax and other companies where they manager to keep the whole thing hush hush for the longest period.

What AT&T is offereing here 'Cyber security consulting service' sounds pretty interesting, got to see how that practically translates into works.

50%
50%
ms.akkineni
ms.akkineni
10/30/2017 4:35:19 PM
User Rank
Platinum
Re: Point of Statistical Order
@John.B:

Here is what i think. It is the combination of both - security additions for new places as per the needs and applying enhancements to the existing security. For the second option, the reason is pretty obvious. As the industry experiences a new breach / hack all companies become alert and try to follow the ins and out of that incident and try to appropriately enhance their models proactively.

50%
50%
clrmoney
clrmoney
10/30/2017 2:35:42 PM
User Rank
Platinum
More Cloud and Security Concerns
I will always say more security when dealing online with cloud , but cloud has a lot to offer when it comes to networking etc. I think it is important that we have mote security because things are getting more digita,l technical and advanced for hackers, but you always have to stay ahead of the game.

50%
50%
JohnBarnes
JohnBarnes
10/30/2017 2:21:53 PM
User Rank
Platinum
Point of Statistical Order
I'm wondering how much of rising expenditures on security are because of increasing numbers of threats, and how much are because of simple expansion of the number of devices and users?

By analogy to physical security: if you are a lock manufacturer, and you are making more every year, that might be because there are more burglars (i.e. more threats) or it might be because there are more buildings (i.e. more doors and windows). 

I was just realizing that we see the increasing expenditures on security figures all the time, but it's not clear what the mixture is of new places that need security or of added security threats to existing places. Has anyone seen anything that tries to disentangle those issues?

50%
50%
<<   <   Page 4 / 4


Latest Articles
Italy's 5G auction could exceed a government target of raising €2.5 billion ($2.9 billion) after attracting interest from companies outside the mobile market.
The emerging-markets operator is focusing on the humdrum business of connectivity and keeping quiet about some of its ill-fated 'digitalization' efforts.
Three UK has picked Huawei over existing radio access network suppliers Nokia and Samsung to build its 5G network.
Vendor says that it's its biggest 5G deal to date.
Verizon skates where the puck is going by waiting for standards-based 5G devices to launch its mobile service in 2019.
On-the-Air Thursdays Digital Audio
Orange has been one of the leading proponents of SDN and NFV. In this Telco Transformation radio show, Orange's John Isch provides some perspective on his company's NFV/SDN journey.
Special Huawei Video
10/16/2017
Huawei Network Transformation Seminar
The adoption of virtualization technology and cloud architectures by telecom network operators is now well underway but there is still a long way to go before the transition to an era of Network Functions Cloudification (NFC) is complete.
Video
The Small Cell Forum's CEO Sue Monahan says that small cells will be crucial for indoor 5G coverage, but challenges around business models, siting ...
People, strategy, a strong technology roadmap and new business processes are the key underpinnings of Telstra's digital transformation, COO Robyn ...
Eric Bozich, vice president of products and marketing at CenturyLink, talks about the challenges and opportunities of integrating Level 3 into ...
Epsilon's Mark Daley, director of digital strategy and business development, talks about digital transformation from a wholesale service provider ...
Bill Walker, CenturyLink's director of network architecture, shares his insights on why training isn't enough for IT employees and traditional ...
All Videos
Telco Transformation
About Us     Contact Us     Help     Register     Twitter     Facebook     RSS
Copyright © 2024 Light Reading, part of Informa Tech,
a division of Informa PLC. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use
in partnership with