Evolving Broadband Networks with Cisco Subscriber Edge

Evolving Broadband Networks with Cisco Subscriber Edge

This is Part III of a three-blog series on solutions to overcome challenges associated with bridging the digital divide.    In part I of this series, we discussed traditional broadband network architectures and their limitations. In part II, we discussed details on the evolution of broadband networks, using a distributed architecture with a centralized control plane, designed to address the challenges associated with traditional broadband networks. In this final blog, we will focus on the…

Read More

Re-architecting Broadband Networks

Re-architecting Broadband Networks

This is Part II of a three-blog series on solutions to overcome challenges associated with bridging the digital divide. In the previous blog (see Bridging the Digital Divide with Subscriber Edge), we discussed the traditional broadband network design. In this blog, we will focus on a new architecture for broadband networks, and the challenges that they address. Moving to a distributed architecture The ability to enable subscriber functions on different layers or devices in the…

Read More

Bridging the Digital Divide with Subscriber Edge

Bridging the Digital Divide with Subscriber Edge

This is Part I of a three-blog series on solutions to overcome challenges associated with bridging the digital divide.    Bridging the digital divide has been a longstanding top priority for countries globally. According to Broadband Research, in 2023 approximately five billion people (64% of the world’s population) were connected to the internet. That means roughly three billion people do not have the basic digital necessities such as access to data, sharing information, or communicating….

Read More

SSL vs TLS: Which Should You Be Using?

SSL vs TLS: Which Should You Be Using?

Secure communication protocols like SSL and TLS are the modern Internet’s foundation. They form an invisible yet essential layer to protect all our online activities from ever-increasing, evolving cyber threats. This article reviews differences, use cases, and best practices for each so you can make an informed decision. What is SSL and TLS? The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols use encryption algorithms to establish a secure connection between two endpoints….

Read More

Benefits of Cloud Automation

Benefits of Cloud Automation

Benefits of Cloud Automation Workload Security Learn more about how cloud automation can simplify security controls, policies, and scans. By: Andrew Stevens April 18, 2023 Read time:  ( words) Related articles in the Cloud Migration series: Automation is the bedrock to innovation. It allows people to work smarter, not harder. Think of inventions like the dishwasher, laundry machines, and the robotic vacuum. All of these automate chores that are mundane, tedious, and time-consuming. You can…

Read More

Best Practices for Secure Remote Development

Best Practices for Secure Remote Development

Remote work and work from home have become commonplace in software development. When done properly, it allows software teams to collaborate from anywhere, which can potentially reduce company overhead, boost productivity, and aid recruitment. But without the right security measures in place, developing from home can increase an organization’s exposure to security breaches. Some of the common risks that a developer might face when working from home include: Malware: any software created with hostile intentions,…

Read More

4 Tips for Better AWS Cloud Workload Security

4 Tips for Better AWS Cloud Workload Security

There are a few key criteria that we need to consider and include in our cloud architectures to better protect our workloads in the AWS cloud. Vulnerability detection and prevention Protect against threats and ransomware Ability to send security events generated from different sources to a centralized platform in a simplified framework. Misconfigurations and lack of visibility for our cloud resources But odds are we have a few, to ensure the security of our workloads,…

Read More

Policy as Code vs Compliance as Code

Policy as Code vs Compliance as Code

Developments in automation and orchestration of IT systems have been steadily changing in the past decade. There has been a shift from manual to automated management across several dimensions—including server configuration, networking, and even business processes. One key area where automation is playing an increasingly important role is compliance. When it comes to policy and compliance, automation comes in the form of policy as code and compliance as code. What is policy as code? Policy…

Read More

How to Avoid LDAP Injection Attacks

How to Avoid LDAP Injection Attacks

Lightweight Directory Access Protocol (LDAP) injections are arguably the most dangerous type of injection attack. The data accessed via LDAP is usually valuable and confidential. LDAP is commonly used in web applications for authentication, authorization, and storing and retrieving confidential data. Users typically utilize this protocol to manage user accounts, organize groups of users within an organization, and synchronize files across multiple systems. Consequently, an attack on LDAP is an assault on the backbone of…

Read More

Understanding Jamstack Security

Understanding Jamstack Security

Over the past few years, Jamstack (previously stylized as JAMStack) has emerged as a new architectural paradigm for delivering websites and web-based applications with the promise of improved performance, scalability, and security over the traditional server-driven approach to web development. In the server-driven model, even the simplest website requires a web server such as Apache or Nginx to deliver its content, a database such as MYSQL to store and retrieve its data, and often an…

Read More
1 2 3 8