Gartner predicts that by 2022, 40% of privileged access will be ephemeral. In the same white paper, they discuss the advantages of moving away from Standing Privileges – a key risk factor – and developing a just-in-time model with zero standing privileges. What are these models and what would ephemeral user management look like?
With the Covid-19 pandemic and an increase in working remotely, companies are beginning to recognise that the growth in data and devices within their network is starting to outpace their IT capabilities. In this blog we explain how companies can benefit from network automation, how to get started and which automation tools to consider.
In this blog we will discuss automated testing within projects, outline how this is done on a high level as well as explain how beneficial automated testing is within any ongoing software projects.
The rise in automation has shown value for businesses across many industries and functions within, and IT security is following a similar trajectory. Many security management tools have evolved to incorporate automation capabilities to solve the problem of manual processes when dealing with non-manual cyber threats.
With the improved technological capabilities of 5G, operators are encountering a significantly increased attack surface with more potential entry points for attackers. Here we look at the considerations you need to take for 5G networks.
In the spirit of 5G we are bringing you another blog post, this time we will explore how households as we know it can benefit from 5G technology. After all, 5G technology isn't all about "faster broadband" or "faster internet connection".
5G brings vast innovation to the next generation of mobile networks. One of the technologies that thrives using 5G is Multi-Access Edge Computing. As a continuation of our 5G series, this blog explores what edge computing is and how it affects the end-users experience.
5G is the latest iteration of cellular technology, engineered to greatly increase the speed, capacity and reduce the latency of wireless networks. This blog post will discuss the technological evolution and benefits of 5G, along with use cases.
A large multinational telco engaged Net Reply to migrate a legacy web application. Net Reply utilised Scrum to deliver the project, which was completed on-time, on-budget and it maximised the customer’s original scope.
In this article we are going to look at recent statistics of open source software utilisation in the United Kingdom. Then we will explore the advantages and finally we will dive into an ongoing 5G Telco project where open source tools are used in a great extent.
Telecoms fraud is estimated to cost the industry €29 billion a year. With fraudulent activity on the rise, this article will discuss how the Telco industry can prevent and detect telecommunication fraud events.
A survey by Google identified that 65% of people use the same password for most of their accounts. Additionally, 30% of those passwords could be cracked within 10 guesses. Most people understand the risks of using the same password, but they do it anyway to make life easier.