• |

A10 Blog


Cyber Security

Select a category

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

January 28, 2020

Managing Multi-cloud Chaos

Are organizations solving multi-cloud challenges today? As the race to the cloud accelerates, both the benefits and the challenges of multi-cloud infrastructures are becoming clearer. There’s no question that multi-cloud deployments now play a foundational role in everything from everyday business needs, digital transformation, and to DevOps and SecOps—but it’s also essential for IT to…

January 23, 2020

Interview with Isaac Sacolick, President, StarCIO

In the “5G: Securing What Matters” blog post series, we showcase thought leaders and their unique perspectives on the intersection of 5G, security, and technology. We recently chatted with Isaac Sacolick, who is a top CIO influencer, keynote speaker, and best-selling author. Tell us about yourself. I love how emerging technologies and innovating with them…

January 22, 2020

Visit A10 Networks at MWC Barcelona

The global deployment of 5G networks is rapidly gaining momentum. 5G promises higher speeds, lower latency and a multitude of new IoT applications. And for the mobile operator, it means massive disruption in existing network technologies to meet ever higher requirements from critical customers. A10 Networks is leading the industry in high-performance security and scale…

December 23, 2019

Why Roaming Still Matters in a 5G World

5G changes a lot, but not everything. While 5G security is a big step forward, vulnerabilities and risks still abound, especially when it comes to roaming. Why roaming? Because GTP, the legacy protocol that provides interconnect between multi-generational network interfaces, is inherently vulnerable. And as we’ll see later in this post, multi-generational networks (2G through…

December 20, 2019

KubeCon + CloudNativeCon 2019 Takeaways

Cloud Native Computing Foundation’s KubeCon + CloudNativeCon 2019 recently took place in San Diego, California. Along with an increase in the number of companies and attendees, Kubernetes also got the attention it deserves from small, medium, enterprise and telco businesses, as well. Here are my takeaways from this show. Kubernetes is Stable for Production Use…

December 19, 2019

GTP Remains a Security Threat as Operators Transition to 5G

Multi-generational Mobile Networks Will Linger for Years to Come GPRS Tunneling Protocol (GTP) is a 2.5G technology that provides interconnect between various network interfaces, enabling mobile users to roam seamlessly between networks of different generations. The protocol was developed in tandem with General Packet Radio Service (GPRS), the packet-oriented mobile data standard integrated into GSM…

December 17, 2019

In 2020: My Toothbrush Will Be Hacked

In 2020, my toothbrush will be hacked. I’m sure it will happen. I will only discover it when I go to the dentist for my regular check-up and find out that I have a new cavity and [GASP], I’m still not flossing correctly. Most hacking breaches are not discovered for months after they happen. You…

December 11, 2019

For 2020: Cyber Attacks are the Norm

As we get close to the end of 2019, its time to have a look at the year 2020 and what it would have in store for enterprises. Since we are in the business of securing our enterprise customers’ infrastructures, we keep a close eye on how the security and encryption landscape is changing so…