1-800-309-4804         Contact Us         MyNETSCOUT         Blog         Investors         Company
Bridge
Enabling Guardians of the Connected World
Privacy

Holistic Real-time Service Visibility

World

Power of Traffic-based Data

Space

Because #ThereIsNoOff

­

ENTERPRISE

News

Read the latest

Buildings

Enterprise News

SECURITY

News

Read the latest

Privacy

Security News

SERVICE PROVIDER

News

Read the latest

Tunnel

Service Provider News

  • artificial intelligence

A Portent for Computing and Society

By |February 1st, 2017|

Just recently I wrote an article for Venture Beat where I retold the story of the chess playing king and the traveling sage. The sage, in return for beating the king at chess, requests that [...]

  • Mark Twain

History Doesn’t Repeat Itself but it Often Rhymes

By |February 1st, 2017|

Taking a look back to the very first Worldwide Infrastructure Security Report (WISR) twelve years ago and of course, many things are vastly different. One thing is clear. Things are more complex today, from the attacks to the infrastructure, and that benefits attackers.

  • Arbor Chart

A DDoS Attack Only Needs to Be as Large as “Your” Network Pipe

By |January 25th, 2017|

As we look back over 2016, one of the most obvious stories will be the dramatic rise in the weaponization and size of DDoS attacks. At the beginning of 2016 we noted the largest attack being approximately 500Gbps. In the later months of 2016, we saw the monetization of multiple IoT-based botnet DDoS attacks that were close to breaking the 1 Tbps mark.

  • Higher Education

Higher Education’s Lessons on Cybersecurity

By |January 4th, 2017|

As my colleague discussed back in September, one of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks - specifically, DDoS as a smoke screen as [...]

Algorithms and Data Replace People, the Need for Service Assurance Increases

By |December 22nd, 2016|

Machine learning is programmatic at heart. It typically starts with a large amount of data that's been organized by people. This might be tagged photos, for example. The program analyzes the data closely and sniffs [...]

  • Unconnected chatty devices

Unconnected Chatty Devices

By |October 26th, 2016|

We all do it. We know we do it. And we think nothing of it. We bring our mobile devices with us wherever we go, including the office. But we don’t use them most of [...]

  • Cybersecurity Survey

Survey Says: Consumer Anxiety About Online Security Does Not Translate into Action

By |October 26th, 2016|

Throughout this month, we have shared our thoughts on the various themes aligned with National Cybersecurity Awareness Month. This week’s theme is “Our Continuously Connected Lives: What’s Your ‘App’-titude?” In an effort to help generate more consumer awareness around online security preparedness, Arbor commissioned a survey […]

  • BDA Privacy

Can Big Data Analytics and Privacy Co-Exist?

By |October 26th, 2016|

There is a wealth of information that can be gathered from every mobile device and every subscriber session device both successful and failed. What is the worst performing mobile device? How many and which mobile [...]

  • Service Providers

No “Dumb Pipe” for these Carriers: The Next Wave of Service Provider Mergers

By |October 25th, 2016|

The recently announced acquisition of Time Warner by AT&T speaks to both the fear of service providers becoming relegated to “dumb pipe” or more simply just communication transport providers and to the importance of content [...]