804 results
hands on keyboard in the dark
/ Gary Sockrider

DDoS: The Next Generation

Geopolitical conflict continues to drive up the number of distributed denial-of-service (DDoS) attacks, with spikes of up to 1,900 percent in certain areas correlating with...

  • DDoS
  • Service Provider
Hands typing on laptop holding a credit card
/ Robert Derby

What Happened Before the Breach?

A major retailer has just suffered a massive data breach. Customer credit card information is circulating on the dark web, fraudulent transactions are skyrocketing, and consumer...

  • Security
Power Lines
/ NETSCOUT

Product Energy Efficiency Is Good for Business

The explosion of digital data, along with the growing adoption of artificial intelligence (AI)-powered applications, has created exciting opportunities for businesses in nearly...

  • Executive
Gentlmen in button up shirt with arms crossed looking confident  with monitors in background.
/ Anthony Cote

Why Digital Resilience Starts Before a Slowdown

Digital resilience is not a response plan. It’s a readiness posture. Too often, business continuity strategies are activated only after disruptions occur. But by then, the damage...

  • Enterprise
Group of fans watching game on cell phone
/ Jennifer Steele

Carrier Aggregation Shines in Spotlight with Taylor Swift-inspired Metrics

Recent announcements by major North American mobile service providers are once again putting carrier aggregation in the spotlight. On January 7, 2025, Verizon announced the...

  • Service Provider
Professional Woman looking over laptop in datacenter
/ Robert Derby

What Happened Before the Breach?

A major insurance provider is reeling from a catastrophic data breach. Sensitive customer data, including personally identifiable information (PII), policy details, and financial...

  • Security
Woman holding laptop in data center
/ Monica Paolini

Taking control of monetization

Monetization is the most pressing challenge in the industry—for operators and for most ecosystem players—but also a stubbornly elusive target. Network capacity and coverage have...

  • Service Provider
Blue Energy
/ Robert Derby

What Happened Before the Breach?

The energy grid is under attack. Power plants, pipelines, and substations are being compromised, and operations grind to a halt. A cyberattack has struck with a sophisticated, well...

  • Security
Women in hardhat holding electronic tablet
/ Anthony Cote

Are Remote Manufacturing Sites Becoming IT Blind Spots?

Everything you touch, from your coffee mug to your keyboard, began as an idea. Manufacturing made it real. But “building reality” requires precision. As digital transformations...

  • Enterprise
2 people dressed in government uniforms another in a suit looking over monitor
/ Robert Derby

Government Data Breaches: The Ripple Effect That Could Have Been Avoided

A breach has rocked the government sector. Confidential data has been stolen, critical systems have been compromised, and the impact is rippling through agencies. The attack was a...

  • Security
5G Highway
/ Agnes Mends Crentsil

APIs: The Gateway to Dynamic 5G Networks

According to Ericsson, the opportunity created by mobile network application programming interfaces (APIs) will grow to more than $20 billion by 2028. APIs are ways for different...

  • Enterprise
  • Service Provider