If you are still using legacy technology for your business, you might be missing out on the benefits of a more modern solution. Legacy technology refers to outdated systems, software or hardware that are no longer supported or updated by […]
If you are still using legacy technology for your business, you might be missing out on the benefits of a more modern solution. Legacy technology refers to outdated systems, software or hardware that are no longer supported or updated by […]
In today’s rapidly evolving digital landscape, customers face the critical challenge of migrating from legacy technology to modern, agile solutions that can meet the demands of a competitive marketplace. Working with an experienced managed services provider, like Lumen, can help […]
In an era where technology evolves at breakneck speed, companies are faced with a pivotal decision: cling to the familiarity of legacy systems or embrace the modernization of their technological solutions. The choice is clear for those looking to thrive—migration […]
Some of the most impactful experiences of my career involve two industries colliding: sports and technology. I’ve spent more than two decades playing on both sides—working in technology to solve customer pain points and helping bring the Seattle Seahawks’ mascot […]
Executive Summary Revision June 7, 2024: As this story has developed, we have received feedback from a vendor/partner. While we observed a drop in activity associated with multiple router models based on scan data, we assess that ActionTec routers were […]
Imagine that you are the CTO of a retailer with a large online presence. The holiday season is upon you, and while business is booming, you are operating with reduced security staff and limited resources to monitor your networks and applications. […]
Executive Summary: The Black Lotus Labs team at Lumen Technologies is tracking a malware platform we’ve named Cuttlefish, that targets networking equipment, specifically enterprise-grade small office/home office (SOHO) routers. This malware is modular, designed primarily to steal authentication material found […]
Digital business transformation and technology adoption are not just buzzwords, but strategic imperatives for large enterprises that want to stay competitive and agile in the face of changing customer expectations, market dynamics and regulatory pressures. The pace of digital transformation […]
As technology evolves, so do the security risks that threaten your organization. Whether you are adopting new technologies to enhance customer experiences, streamline business processes or leverage data for AI-driven insights, you need to ensure that your security posture will […]
The retail industry is undergoing a digital transformation, driven by changing customer expectations, omnichannel strategies and eCommerce platforms, with security risks evolving just as fast. Risks such as data breaches, downtime, organized retail crime and return fraud, and supply chain […]