You're Stealing My Business!

July 6, 2017 |by Expo Developer | Comments Off on You're Stealing My Business!

DOCSISrrrrrr theft of service is costing operators millions in lost revenue and opex costs. A recent POC effort with a major US operator showed upward of 450,000 rogue devices on the network. Lacking the security features of modern-day set-top boxes, cable modems can be, and are, manipulated. This allows multiple theft of services, as well as content that can be resold on the black market. We'll examine how to detect and prevent theft of services and content.

KEEP READING

You're Stealing My Business!

July 6, 2017 |by Expo Developer | Comments Off on You're Stealing My Business!

DOCSISrrrrrr theft of service is costing operators millions in lost revenue and opex costs. A recent POC effort with a major US operator showed upward of 450,000 rogue devices on the network. Lacking the security features of modern-day set-top boxes, cable modems can be, and are, manipulated. This allows multiple theft of services, as well as content that can be resold on the black market. We'll examine how to detect and prevent theft of services and content.

KEEP READING

You're Stealing My Business!

July 6, 2017 |by Expo Developer | Comments Off on You're Stealing My Business!

DOCSISrrrrrr theft of service is costing operators millions in lost revenue and opex costs. A recent POC effort with a major US operator showed upward of 450,000 rogue devices on the network. Lacking the security features of modern-day set-top boxes, cable modems can be, and are, manipulated. This allows multiple theft of services, as well as content that can be resold on the black market. We'll examine how to detect and prevent theft of services and content.

KEEP READING

The Scary Deep Dark Net

July 6, 2017 |by Expo Developer | Comments Off on The Scary Deep Dark Net

We'll take a detailed look at what the dark net is, how hackers use it to secretly and anonymously communicate, and how many firms are monitoring this hidden Internet for threats to companies and customers.

KEEP READING

The Scary Deep Dark Net

July 6, 2017 |by Expo Developer | Comments Off on The Scary Deep Dark Net

We'll take a detailed look at what the dark net is, how hackers use it to secretly and anonymously communicate, and how many firms are monitoring this hidden Internet for threats to companies and customers.

KEEP READING

The Scary Deep Dark Net

July 6, 2017 |by Expo Developer | Comments Off on The Scary Deep Dark Net

We'll take a detailed look at what the dark net is, how hackers use it to secretly and anonymously communicate, and how many firms are monitoring this hidden Internet for threats to companies and customers.

KEEP READING

The Future of Security Architectures

July 6, 2017 |by Expo Developer | Comments Off on The Future of Security Architectures

Our evolving networks now include public Wi-Fi, Software-Defined Networks (SDN), Network Functions Virtualization (NFV), dev ops, and containerization-just to name a few. Join this workshop as we explore the security challenges these new technologies present, as well as how to leverage new technologies to improve security.

KEEP READING

The Future of Security Architectures

July 6, 2017 |by Expo Developer | Comments Off on The Future of Security Architectures

Our evolving networks now include public Wi-Fi, Software-Defined Networks (SDN), Network Functions Virtualization (NFV), dev ops, and containerization-just to name a few. Join this workshop as we explore the security challenges these new technologies present, as well as how to leverage new technologies to improve security.

KEEP READING

The Future of Security Architectures

July 6, 2017 |by Expo Developer | Comments Off on The Future of Security Architectures

Our evolving networks now include public Wi-Fi, Software-Defined Networks (SDN), Network Functions Virtualization (NFV), dev ops, and containerization-just to name a few. Join this workshop as we explore the security challenges these new technologies present, as well as how to leverage new technologies to improve security.

KEEP READING

IoT Security: Is It Really a Risk?

July 6, 2017 |by Expo Developer | Comments Off on IoT Security: Is It Really a Risk?

Join this workshop for a discussion on the current IoT threat landscape, as well as a survey of tools to combat these threats. We'll also take a look at the efforts of leading standards organizations and security initiatives in this area.

KEEP READING
Page 1 of 1812345...10...Last »