396 results
2 people reviewing data on 4 monitors in SOC
/ Robert Derby

The Next Phase of Attacks and the Blind Spots We Must Address

On October 15, 2025, a major network infrastructure provider disclosed a sophisticated cybersecurity incident in which a nation-state threat actor maintained long-term...

  • Security
netscout-wins-overall-network-security-solution-year
/ Robert Derby

NETSCOUT Wins “Overall Network Security Solution of the Year”

When it comes to cybersecurity, visibility is everything. Without it, even the most advanced tools can’t help teams detect, investigate, or respond effectively to threats lurking...

  • Security
Cable/MSO Operators Rise Above the Data Deluge
/ Jennifer Steele

Cable/MSO Operators Rise Above the Data Deluge

"In God we trust; all others must bring data." Although the phrase is widely attributed to W. Edwards Deming, the father of the post-WWII quality movement, the sentiment applies...

  • AIOps
  • Service Provider
2 people reviewing data over a laptop
/ Brad Christian

What Are Zero-Day Attacks, and Why Do They Work?

Zero-day attacks have become a significant concern in the realm of cybersecurity, posing a formidable challenge to individuals and organizations alike. These attacks exploit...

  • Security
People doing Q&A at a conference
/ Heather Broughton

Innovation, Visibility, and the Future of Cable: Highlights from SCTE TechExpo25

SCTE TechExpo25 brought together the brightest minds in broadband and telecommunications to explore the future of connectivity. From artificial intelligence (AI)-driven automation...

  • AIOps
  • Service Provider
Happy person on headset in front of laptop
/ Robert Derby

Why Network Visibility Is the Thread That Holds Cybersecurity Together

Every organization is chasing the same thing in security: speed, clarity, and confidence. But in reality, most are bogged down by complexity, siloed tools, and an overwhelming...

  • Security
Man in front of monitor focusing on issue at hand
/ Robert Derby

Why SOC Efficiency Is the Most Valuable Currency in Cybersecurity

In cybersecurity, time is scarce, talent is scarce, and certainty is scarce. That’s why efficiency has quietly become the most valuable currency inside the security operations...

  • Security
World Globe with keylocks surrounding it.
/ Robert Derby

From Detection to Response: Why Confidence Is the Real Game Changer

Cybersecurity often feels like a race where you don’t know when the starting gun will fire. The moment a threat slips past the perimeter, the countdown begins. Every minute between...

  • Security
Digital Human Head with AI Brain
/ Jennifer Steele

Heavy Reading Analyst Note: Moving Beyond Basic Automation with AI-Powered RAN

Ruth Brown, principal analyst for the Wireless Networks group at Heavy Reading (part of Omdia), recently published an analyst note titled “AI-Powered RAN: Moving Beyond Basic...

  • AIOps
  • Service Provider
person in front of monitor reviewing network settings
/ Robert Derby

The First Line of Defense Is Still the Network. But That’s Only the Beginning

For years, the security industry has been captivated by the promises of new acronyms: EDR, XDR, CDR. Each wave has promised broader coverage, better detection, and faster responses...

  • Security
Cell Towers overlooking hills and mountains
/ Agnes Mends Crentsil

Connectivity in Crisis: How CSPs Power Natural Disaster Recovery

Research shows that natural disasters are increasing— of the 10 years with the most natural disasters, 9 were in the last decade. From 1980 to 2024, the U.S. averaged 9 events per...

  • Service Provider
3 people sitting on sofa watching World Cup
/ Christian Syrbe

2026 World Cup: Endurance test for the next era of mobile networks

The massive scale of the tournament, which includes 16 stadiums and 104 matches, will push the power of mobile networks to the limit. Global sporting events have always driven...

  • AIOps
  • DDoS
  • Service Provider