Tagged: Security

Thinking NFV? – Infoblox and VMware Can Help

By Dilip Pillaipak, Vice President of Service Provider Products at Infoblox In a recent Technology Business Research study, results showed that while some tier-one telecom operators have moved from network functions virtualization (NFV) proof-of-concepts (POCs) to full deployments, the majority will operate in the POC stage throughout 2016 with greater...

News from yesterday’s Cybersecurity Deep Dive

Author: Derek Kerton, Managing Partner of Kerton Group and Chairman of Telecom Council of Silicon Valley, @derekkerton At our Cybercrime, Security, and Privacy Meeting, hosted by Microsoft, we had more than a full day’s worth of issues to tackle, and a half-day to cover them. Cybercrime, Security, and Privacy (CSP) are...

Cybercrime, Security, and Privacy Deep Dive, 10/28 – Register Now

Deep Dive: Cybercrime, Security, and Privacy in the Snowden Era Register Now to join the Telecom Council as we explore Cybercrime, Security, and Privacy. Although there have been worse times for freedom and surveillance, there has never been a time with more different vectors, threats and technologies that can all...

Privacy and Identity Meeting at Sony

Author: Liz Kerton, Industry Analyst at Kerton Group These are high times for the topics of Privacy, Identity, and Security. Recent press has brought out the Snowden revelations, the Verizon persistent cookie scandal, the black hat Sony Pictures hack, the Uber passenger tracking scandal, and so much more. The awareness of the issue...

Security should be top of mind for anyone building a connected device

Author: Liat Ben-Zur, Chairman of the AllSeen Alliance and Sr. Director of Product Management & Business Development , Qualcomm Connected Experiences, Inc. Devices do not need to be connected to the internet, to make them “smart”. The Internet of Everything does not require that everything needs to be connected to the Internet.