Latest Stories

Featured Stories

Filter By Categories

Scary Telecomm Stories

As Halloween approaches, it is tradition to tell scary stories to chill the blood. Let’s take this opportunity to tell a...

The Business Case for Addressing the Security Needs of the SMB

The unmet security needs of SMBs represent a large, untapped source of revenue for service providers globally. Mobile an...

Taming the Big 4: Four ICT Challenges Facing Power Distributors

Challenge #4: Smart Grid is here. You’d be wise to take heed. In the last of our ‘Taming the Big Four’ blog series, whic...

7 Key Cybersecurity Challenges SMBs Face

We’ve all heard about the recent global ransomware attacks Petya and WannaCry. The news instilled a sense of fear in bus...

Taming the Big 4 – Four ICT Challenges Facing Power Distributors - Part 3

Challenge #3: Migration to Packet. An Obstacle to Some. An Opportunity for Others In the third of our ‘Taming the Big Fo...

Taming the Big 4 – 4 ICT Challenges Facing Power Distributors - Part 2

In the second of our ‘Taming the Big Four’ blog series, which looks at four key challenges facing power distributors, Ma...

A New Way to Deal with DDoS

DDoS is a Threat to Large and Small Operators Alike Most large scale providers manage Distributed Denial of Service (DDo...

Optical Encryption Moves from Niche Application to Ubiquitous Service

L1 Encryption Needed in Today's Networks When initially introduced into the market, optical encryption was a niche appli...

The Managed Security Sale

A Day in the Life of an SMB Account Manager   The single biggest existential threat that's out there, I think, is cyber....

Security in the IoT World: Scaring the Audience

Why Networks Need Security? At my recent presentation to the 2016 Canadian Utilities Information & Communications Techno...

Major Themes of the Big Communications Event 2016 Part 1 – Virtualization and Se...

The LightReading Big Communications Event (BCE) for 2017 was held May 24th and 25th in Austin, Texas. The attendees list...

Overcoming Network Security Challenges with Network Function Virtualization

Up until the late 2000s, implementing carrier-grade security solutions involved a great deal of struggle and multiple ap...

Subscribe Email

ECI For Network Solutions

Popular Tags

Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced. Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.Lorem Ipsum is a simple dummy text used as a dummy text contents. Lorem ipsum will be replaced.