CLDAP Reflection Attacks

CLDAP Reflection Attacks are Increasing! Why? Preventable!!!

Yes, CLDAP Reflection Attacks are increasingly used in DOS attacks! Everyone was warned! We have lots of data which illustrated how CLDAP is being used for reflection DOS attacks. Now we have the news from Netlab 360 that CLDAP is now the #3 protocol used for DOS reflection attacks – CLDAP is Now the No.3 Read More

Checklist-Vendor-Security

Demand Security from your Vendors

Demande Security from your Vendors. Ask the right “Security Questions.” This provides a list of questions that anyone can use with their vendors to get a better understanding of their security capabilities. Start meaningful “Security Conversations.”

Iceberg-1024x767

Remediation is the Foundation of your Security Strategy!

Remediation is the Foundation of your Security Strategy! In many ways, this year’s RSA conference was overwhelming. In other ways, it was a disappointment in how the market is providing solutions to mitigate our security risks. As several colleagues have pointed out, “remediation” is a huge gaps at 2015 RSA, As Adam Stein pointed out, Read More

Netflix Country Level Performance

Netflix Expanding to 200 Countries – What does that mean for Telecom Operators

f you have not already heard this Netflix announcement last week, CEO Reed Hastings, and CFO David Wells said …. “We already offer Netflix in about 50 countries and have learned a great deal about the content people prefer, the marketing they respond to and how to best organize ourselves for steady improvement. Acceleration to Read More

CLDAP Reflection Attacks

Security Workshop in Jakarta: Understanding the Real Cyber Security Threat

This is the first in a series of Security Workshops that I will be teaching in the region. Most will be in Indonesia and other parts of ASEAN. Stay tuned or connected to me via Linkedin to get updates. Understanding the Real Cyber Security Threat Where: @ America Pacific Place Mapp – Level 3 – Jakarta Indonesia. Read More

CLDAP Reflection Attacks

Does the Internet “End” at 500K routes?

No! Of course, the Internet does not end at 500K routes. On August 13, 2014, there was a lot of “news” about instability issues on the Internet that might have been caused by a surge of new Internet routes (see articles like “Internet routers hitting 512K limit, some become unreliable” – http://arstechnica.com/security/2014/08/internet-routers-hitting-512k-limit-some-become-unreliable/). The most accurate write Read More

canstockphoto17647669

Don’t wait, prepare for the Internet Skills Gap

I’m grateful to my peers who spent the time to have coffee over this past week. We all see big changes in the industry and are really worried about the skills needed to capitalize on these changes. What follows are some thoughts that might be useful as we all explore how we can bridge the Read More

canstockphoto17809542

Security Questions to ask Vendors

What security questions are you asking your vendors? The Bloomberg article, “How Russian Hackers Stole the Nasdaq,” is a sobering insight into today’s risk. It should be a wake-up call for all organizations in all parts of the world to understand that even the best security teams are facing an overwhelming threat. The focused expertise used by Read More

CLDAP Reflection Attacks

Korea LTE Operators Drive an Ecosystem to Ensure Profitability

“Little things” matter in the telecommunications business. The difference between profitability and “just getting by” often depends on small focus innovations that increase margin, open new business opportunities, and add to the top line revenue. Attention to the “small things” are easily seen with the big Korean SPs. Their success has less to do with Read More