I remember Lumen Technologies when it was a small company. Even today, it still feels very much like a family business. Our people are family, and our customers are family. I have always felt it’s our company’s commitment to use […]
I remember Lumen Technologies when it was a small company. Even today, it still feels very much like a family business. Our people are family, and our customers are family. I have always felt it’s our company’s commitment to use […]
There is an old saying attributed to Henry Ford, explaining why he didn’t wait for consumers to tell him that they needed automobiles. “If I asked them what they wanted, they would have said ‘faster horses,” he said. Some people […]
In a recent blog post, I cited a report saying that 50 percent of enterprises are expected to deploy edge compute solutions within three years, correlating with the growth of low-latency IoT applications. Capitalizing on that trend, major mobile network […]
The relationship between applications and infrastructure has evolved a lot over the past few decades. We continue to see a steady move from centralized to distributed applications, data and infrastructure. With that move, we continue to see greater capabilities, more […]
Throughout my career, I have seen technology achieve unimaginable levels of speed across our data networks. In so many ways, what we once considered network “latency” is quickly becoming a thing of the past. Now the real challenge might be […]
Although I live in the heart of the Rocky Mountains, my favorite sports team plays seven time zones away. I’m a fan of international football in general, and FC Barcelona in particular, because I love the beauty and fluidity of […]
Bolstered by contributions from Black Lotus Labs and others, Microsoft and FS-ISAC recently took court action to disrupt a particularly insidious botnet called TrickBot – a significant source of ransomware and banking credential theft. As the threat intelligence arm of […]
As we’ve previously written, adversaries continue to ramp up DNS-based attacks to support a wide range of criminal activities. As part of our mission to leverage our network visibility to both help protect customers and keep the internet clean, Black […]
Summary The explosion of Internet of Things (IoT) devices has long served as a breeding ground for malware distribution. The inability for users to patch many IoT devices has only compounded this problem, as bad actors continue to evolve tactics […]
Despite the ubiquity of DNS, too many security teams today do not adequately prioritize it as a focus for monitoring and mitigation of risk. As recent security headlines demonstrate, one increasingly common cyberattack employed by malicious actors is DNS tunneling, […]