271 results
Image of what is believed to be a DDoS Attacker
/ Brad Christian

Why Do Hackers Use DDoS Attacks?

Distributed denial-of-service (DDoS) attacks are a common tactic among hackers. They disrupt the availability of networks, applications, websites, and more to interrupt the...

  • DDoS
  • Service Provider
Cell phone with images of 5G, Lock, gears and hand choosing from selection
/ Agnes Mends Crentsil

How Does 5G Enhance IoT?

Research shows that the cellular Internet of Things (IoT) market is in recovery, with a growth of 7 percent year over year in the first quarter of 2024. 5G provides connectivity...

  • Service Provider
2 people in Operations Lab review information on laptop
/ Heather Broughton

Taking an AIOps Approach to Improve Network Performance Management

At a recent NetworkX webinar, Heavy Reading and NETSCOUT took a closer look at how telecommunications operators are rethinking artificial intelligence for operations (AIOps) to...

  • Service Provider
Hands on Keyboard
/ Andrew Green, Scott Iekel-Johnson

Why NetFlow Is Still the Best Mechanism for Detecting DDoS Attacks

Recently some network operators have raised questions about the use of flow data to detect distributed denial-of-service (DDoS) attacks, with the main concern being a perception...

  • DDoS
  • Service Provider
Vodafone Logo
/ Lori Angelot

NETSCOUT announces the extension of its long-term partnership with Vodafone

NETSCOUT announced the extension of its long-term partnership with Vodafone to enhance the performance of Vodafone’s networks for customers. The multi-year agreement leverages...

  • Service Provider
Man sitting at row of monitors in a NOC.
/ Michael Wetherbee

Are Attacks Hiding in Your Encrypted Traffic?

Distributed denial-of-service (DDoS) attackers are both persistent and creative. One of their creative methods that has seen an increase recently is attacks on HTTPS web...

  • DDoS
  • Security
  • Service Provider
Sign with words REWARD and arrow pointing right and below RISK with arrow pointing left
/ Jennifer Steele

A Poet’s Guide to Digital Transformation

“Only those who will risk going too far can possibly find out how far one can go.” Although T.S. Eliot originally penned these words as a preface for Harry Crosby’s 1931 poetry...

  • Service Provider
woman sitting at desk looking at monitor
/ Brad Christian

Data Protection Compliance Checklist for Service Providers

Various data protection laws exist worldwide. The most notable include the EU General Data Protection Regulation (GDPR) and the U.S. California Consumer Protection Act (CCPA)...

  • DDoS
  • Service Provider
Urban Cityscape
/ Agnes Mends Crentsil

Fixed Wireless Access: A 5G Revenue Opportunity

Fixed wireless access (FWA) technology is accelerating the close of the digital divide in urban areas and underserved communities by allowing communications service providers (CSPs...

  • Service Provider