Disruptive.Asia
  • Home
  • News
  • Views
  • Features
  • Off the Wire
  • Videos
  • Authors
  • About Us
    • About Us
    • Marketing Services

Articles by Jonathon Gordon

cyber security
Views

The big cybersecurity threats you’ll need to defend against in 2018

December 5, 2017 Jonathon Gordon 0

Yes, it’s that time of the year again, already! The who’s who of cyber are putting out their cyber security predictions for the 2018 and we are collating them all for you. We will endeavor Read more…

Views

The true cost of a security breach: it’s not just about money

July 4, 2017 Jonathon Gordon 0

What can make a grown CISO quiver in his/her boots? The gathering of ominous, dark clouds of the dreaded security breach are rapidly sending businesses for cover! Many recent reported cyber attacks have caused significant Read more…

Views

The CISO has finally made it to the board level – now what?

June 28, 2017 Jonathon Gordon 0

As an industry, we now have a plethora of high profile breaches that we can point to when we discuss the impact of not taking security seriously enough. From Home Depot and Target to Sony Pictures Read more…

Views

US cellcos are already paying the cost of unlimited plans

June 16, 2017 Jonathon Gordon 0

All the major US wireless carriers have recently rolled out unlimited plans, and are competing fiercely to outdo each other. But this trend is taking its toll on everyone’s bottom line, according to Cowen and Read more…

Views

Jio discovers the price of switching free users to paid plans

May 17, 2017 Jonathon Gordon 0

In which Reliance Jio learns the hard way that when you start charging for a free service, customers expect more One of the things about free services is that users tend not to complain because Read more…

OTN
Views

Your other big cybersecurity problem: the Persirai IoT botnet

May 15, 2017 Jonathon Gordon 0

Trend Micro has discovered a new attack on internet-based IP cameras and recorders powered by a new Internet of Things (IoT) bot dubbed Persirai. The Persirai botnet has targeted over 1,000 different models of vulnerable Read more…

Views

Cyber attackers are using simple tools and tactics for big payoffs: Symantec

May 10, 2017 Jonathon Gordon 0

Symantec’s latest threat report says that zero-day vulnerabilities and sophisticated malware now tend to be used sparingly, and attackers are increasingly attempting to hide in plain sight. According to the Symantec Internet Security Threat Report Read more…

summer surprise
Views

TRAI cools off Jio’s Summer Surprise while FCC prepares net neutrality reversal

April 18, 2017 Jonathon Gordon 0

A contrast in regulatory regimes: TRAI nixes Jio’s Summer Surprise offer while FCC chairman Pai gets ready to ditch net neutrality rules Once upon a time, not too long ago, US and Indian net neutrality Read more…

date breach
Views

Data breach stats for last year not pleasant reading and likely to get worse

April 5, 2017 Jonathon Gordon 0

The latest data breach stats report from vendor Gemalto shows an increase of 86% YoY. Theft of personal data was top of the data breach stats in 2016, accounting for 59% of all data breaches. In Read more…

Views

The art of cyber deception as a network defense mechanism

March 27, 2017 Jonathon Gordon 0

Gartner says cyber deception technologies are defined by the use of deceit and/or feints designed to thwart or throw off an attacker’s cognitive processes, disrupt an attacker’s automation tools, delay an attacker’s activities or disrupt breach Read more…

Views

SK Telecom’s Pokémon tie-up could reignite zero-rating debate in Korea

March 24, 2017 Jonathon Gordon 0

SK Telecom’s partnership with Pokémon GO is expected to kick off the zero-rating debate in Korea, as one element of the joint marketing venture includes temporarily offering a zero-rating on Pokémon GO until June. This Read more…

Views

Jio’s free data bonanza boosts India’s internet usage 29% in one quarter

March 20, 2017 Jonathon Gordon 0

If you have ever wondered what the impact of free data or low-tariffs is, just take a look at these numbers from India, where mobile internet usage grew 29% over the previous quarter in October-December Read more…

state-sponsored hacking
Views

With state-sponsored hacking becoming the new normal, we’re gonna need a plan

March 17, 2017 Jonathon Gordon 0

Just before this week’s news that the US had indicted two Russian intelligence agents and two Russian criminal hackers for the 2014 hack of Yahoo, Britain’s GCHQ called an emergency summit with British politicians following Read more…

Views

Malaysian cellcos waiting for the digital transformation payoff

March 15, 2017 Jonathon Gordon 0

Digital transformation is set to boom in Malaysia this year, but telcos have yet to feel the digital love. IDC Malaysia recently unveiled its annual predictions for 2017 and beyond, highlighting the impact of emerging technologies Read more…

ransomware
Views

Ransomware was the hot security threat in 2016: report

March 7, 2017 Jonathon Gordon 0

Trend Micro has released its annual security roundup report, “2016 Security Roundup: A Record Year for Enterprise Threats,” which proves 2016 was truly the year of online extortion. Cyber threats reached an all-time high in Read more…

Views

MWC17 post-game: Digital transformation was the real star of this show

March 6, 2017 Jonathon Gordon 1

In a surprise twist, digital transformation took the top spot at this year’s Mobile World Congress. The usual suspects (i.e. the big handset vendors) just couldn’t make an impact this year. With Samsung still reeling, Read more…

Views

Verizon on the innovation trail with launch of Exponent for carriers

March 1, 2017 Jonathon Gordon 0

Verizon launched Exponent last Thursday, just a few days before MWC in Barcelona. Exponent is a new platform through which Verizon will sell software and service capabilities to international carriers, including its Internet of Things Read more…

MWC2017
Views

MWC2017 will be all about “The Next Element”, whatever that means

February 24, 2017 Jonathon Gordon 0

The biggest mobile show in the world is taking place next week – here’s what to expect from MWC2017. One of my customers asked me what the theme for Barcelona was this year. After replying Read more…

Views

T-Mobile and Reliance Jio: two sides of the same disruptive packaging coin

February 17, 2017 Jonathon Gordon 0

While T-Mobile and Jio operate in starkly different conditions, they are both driving their own brand of innovation. What’s great about T-Mobile and Jio is they tend to plan two steps ahead. Whether they think Read more…

facebook future
Views

The Facebook Future: emerging markets, text message ads and video content

February 14, 2017 Jonathon Gordon 0

Facebook is the company that never sleeps. OK so they were late on mobile, but let’s call that a lesson learned. They seem to have very clear strategies to win at just about every game Read more…

Posts navigation

1 2 »

Languages

Features

  • Cybercriminals introduce new phishing tactics to net victims
    March 24, 2023 0
  • AIOps automation application security
    AIOps and automation are crucial to good app security
    March 22, 2023 0
  • IT infrastructure
    Future-oriented IT infrastructure for sustainable success
    March 17, 2023 0
  • cybersecurity talent shortage
    Changing conversations on the cybersecurity talent shortage
    March 13, 2023 0

Off the Wire

  • ZTE sees increases in operating revenue and profit in 2022
    March 10, 2023 0
  • ZTE ranks No. 1 for both PON CPE and DSL CPE shipments
    March 10, 2023 0
  • ZTE unveils more efficient, eco-friendly products at MWC
    February 27, 2023 0
  • ZTE brings brilliant new products and solutions to MWC 2023
    February 25, 2023 0

Videos

  • Huawei revenue sanctions
    Huawei revenue holding up despite US sanctions
    December 31, 2022 0
  • Meta metaverse
    Meta accused of trying to buy dominance of the metaverse
    December 11, 2022 0
  • crypto world cup
    Crypto fan tokens are a hot item at this year’s World Cup
    November 30, 2022 0
  • blockfi bankruptcy
    BlockFi files for bankruptcy as the latest FTX casualty
    November 29, 2022 0

Popular Posts

  • Cybercriminals introduce new phishing tactics to net victims
    Cybercriminals introduce new phishing tactics to net victims

Recent Comments

  • Andrew Doyle on Generative AI is a bubble – we know what happens next
  • Elizabeth Johnson on If PayPal and Facebook allow fraud to occur are they party to that fraud?
  • Trevor Penniall on External risk evaluation needs better tools and transparency
  • JW on NOW Telecom and USTDA move forward on Philippines 5G plan

Archives

Popular Posts
  • Cybercriminals introduce new phishing tactics to net victims
    Cybercriminals introduce new phishing tactics to net victims
Recent Comments
  • Andrew Doyle on Generative AI is a bubble – we know what happens next
  • Elizabeth Johnson on If PayPal and Facebook allow fraud to occur are they party to that fraud?
Important pages
  • About Us
  • Marketing Services
  • Newsletters
  • Privacy Policy
  • Terms and Conditions of Service

© Disruptive.Asia 2023

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}