• |

A10 Blog

/

Cyber Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

December 23, 2019

Why Roaming Still Matters in a 5G World

5G changes a lot, but not everything. While 5G security is a big step forward, vulnerabilities and risks still abound, especially when it comes to roaming. Why roaming? Because GTP, the legacy protocol that provides interconnect between multi-generational network interfaces, is inherently vulnerable. And as we’ll see later in this post, multi-generational networks (2G through…

December 20, 2019

KubeCon + CloudNativeCon 2019 Takeaways

Cloud Native Computing Foundation’s KubeCon + CloudNativeCon 2019 recently took place in San Diego, California. Along with an increase in the number of companies and attendees, Kubernetes also got the attention it deserves from small, medium, enterprise and telco businesses, as well. Here are my takeaways from this show. Kubernetes is Stable for Production Use…

December 19, 2019

GTP Remains a Security Threat as Operators Transition to 5G

Multi-generational Mobile Networks Will Linger for Years to Come GPRS Tunneling Protocol (GTP) is a 2.5G technology that provides interconnect between various network interfaces, enabling mobile users to roam seamlessly between networks of different generations. The protocol was developed in tandem with General Packet Radio Service (GPRS), the packet-oriented mobile data standard integrated into GSM…

December 17, 2019

In 2020: My Toothbrush Will Be Hacked

In 2020, my toothbrush will be hacked. I’m sure it will happen. I will only discover it when I go to the dentist for my regular check-up and find out that I have a new cavity and [GASP], I’m still not flossing correctly. Most hacking breaches are not discovered for months after they happen. You…

December 11, 2019

For 2020: Cyber Attacks are the Norm

As we get close to the end of 2019, its time to have a look at the year 2020 and what it would have in store for enterprises. Since we are in the business of securing our enterprise customers’ infrastructures, we keep a close eye on how the security and encryption landscape is changing so…

December 9, 2019

Boosting mobile revenue with 5G security-as-a-service

The transition to 5G will bring many opportunities to mobile service providers but it will also continue to challenge them to drive greater levels of subscriber revenue. The average revenue per user (ARPU) is flat to down while data volume per device is rapidly rising. Traditional pricing plans are being disrupted around the world and…

December 2, 2019

5G - The Transformation Generation

5G is currently driving transformation on a global scale whether it is for an imminent 5G rollout or laying the foundations as part of a longer-term plan. For Qatar, 5G is a key driver propelling their National Vision 2030 which is made up of four pillars – economic, social, human and environmental. The A10 Networks…

November 21, 2019

Evolving Application Delivery for a Hybrid, Multi-cloud, Containerized World

Hybrid, multi-cloud, and container environments can help organizations increase business agility and compete more effectively—but they also call for new approaches to application delivery infrastructure. To ensure optimal performance, IT needs tools and methods designed to support the full diversity of today’s enterprise requirements: both traditional and modern applications, deployed both on-premises and in the…