Jonathon Gordon

Jonathon Gordon

Jonathon has been lurking around the Telecoms and Internet space for the last 20 years. He is now a man on a mission – that being the reformation of the Industry Analyst business. He is working with his co-conspirators on transforming the Industry Analyst world forever as an Expert with EMI.

The BakerHostetler report says back to basics is best for security

The BakerHostetler report says back to basics is best for security

Written by on April 28, 2017 in Guest Blog with 0 Comments

The BakerHostetler report says companies need to continue focusing on the basics to become and remain “Compromise Ready.” The BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the legal and business risks associated with cyber threats and to have enterprise-wide tactics […]

Continue Reading

As the focus changes to media, Verizon looks for a mega deal

As the focus changes to media, Verizon looks for a mega deal

Written by on April 20, 2017 in Guest Blog with 0 Comments

Verizon eyes Comcast, Walt Disney or CBS for growth. If anyone needed any more evidence that the traditional telecoms model is breaking down, then look no further. Verizon, the largest U.S. wireless carrier, is seeking new sources of growth as the mobile-phone business matures and its new media ventures take time to gain traction. Verizon Communications […]

Continue Reading

Healthcare systems are the target of choice for ransomware

Healthcare systems are the target of choice for ransomware

Written by on April 18, 2017 in Guest Blog with 0 Comments

Another day and another healthcare ransomware attack. The latest healthcare ransomware target – Erie County Medical Center (ECMC) in Buffalo, N.Y.  ECMC and its long-term care at Terrace View facility got hit by a computer virus that prompted a computer system shutdown early Sunday.  As of April 13th, they are still working on bringing their […]

Continue Reading

Beware BrickerBot, a permanent denial of service via the IoT

Beware BrickerBot, a permanent denial of service via the IoT

Written by on April 12, 2017 in Guest Blog with 0 Comments

BrickerBot malware forms a Permanent Denial-of-Service (PDoS) botnet. The BrickerBot malware has been detected on honeypot servers maintained by DDoS protection company Radware. It describes the type of attack as a “permanent denial-of-service” (PDoS). “Over a four-day period, Radware’s honeypot recorded 1,895 PDoS attempts performed from several locations around the world. Its sole purpose was […]

Continue Reading

Is it time for Policy Control to step out of the shadows?

Is it time for Policy Control to step out of the shadows?

Written by on April 10, 2017 in Billing & Payments, Guest Blog with 0 Comments

Policy Control has spent too long on the sidelines. This week, the 7th edition of the Policy Control event took place in Berlin.  While I am usually in attendance at this event, this year I couldn’t make it, but I was asked to judge this year’s awards. The process got me thinking about the challenges […]

Continue Reading

Never under-estimate the threat from insider cyber attacks

Never under-estimate the threat from insider cyber attacks

Written by on April 7, 2017 in Guest Blog with 0 Comments

According to a recent study, despite an increase in spending and investment in deterrence tactics and detection tools, insider attacks continue to cause harm to all types of organizations. The report conducted by Haystax, suggests that, although funding is increasing, inadequate resources are being allotted to predictive risk analytics — a critical component of mitigating […]

Continue Reading

The state of healthcare cyber security will give you a heart attack

The state of healthcare cyber security will give you a heart attack

Written by on April 4, 2017 in Guest Blog with 1 Comment

A recent Healthcare cyber security report from Evolve IP found that more than two-thirds of healthcare organizations have employees with compromised email credentials. Of these compromised accounts, 76 percent included actionable password information for sale on the dark web, the report found. And between about 55 percent and 80 percent of organizations had compromised email […]

Continue Reading

What about one privacy rule for the internet, everywhere?

What about one privacy rule for the internet, everywhere?

Written by on March 31, 2017 in Guest Blog with 1 Comment

President Trump is about to sign a law rolling back previous administration’s internet privacy rules. Wouldn’t it be lovely if we had a single global internet privacy law codifying how all participants should behave? It makes absolutely no sense to have a completely different set of regulations for the Google, Facebook or Netflix folks compared […]

Continue Reading

Here are the data breach statistics for 2016 – fasten seat belts

Here are the data breach statistics for 2016 – fasten seat belts

Written by on March 30, 2017 in Guest Blog with 2 Comments

The latest data breach stats report from vendor Gemalto shows an increase of 86% YoY. Theft of personal data was top of the data breach stats in 2016, accounting for 59% of all data breaches. In addition, 52% of the data breaches in 2016 did not disclose the number of compromised records at the time they […]

Continue Reading

State sponsored hacking is now business as usual

State sponsored hacking is now business as usual

Written by on March 20, 2017 in Guest Blog with 0 Comments

Between the CIA’s cyberespionage arsenal, and the Kremlin-backed state sponsored hacking, do we need a new rulebook? GCHQ spies have called an emergency summit with British politicians following warnings that Russia state sponsored hacking groups have the capabilities to use cyberattackers to disrupt the next General Election. According to The Sunday Times, unnamed sources say […]

Continue Reading

Top