INDEX

Analyst Blogs

ABI Research provides strategic guidance for visionaries needing market foresight on the most compelling transformative technologies, which reshape workforces, identify holes in a market, create new business models and drive new revenue streams. ABI’s own research visionaries take stances early on those technologies, publishing groundbreaking studies often years ahead of other technology advisory firms. ABI analysts deliver their conclusions and recommendations in easily and quickly absorbed formats to ensure proper context. Our analysts strategically guide visionaries to take action now and inspire their business to realize a bigger picture. For more information about ABI Research’s forecasting, consulting and teardown services, visionaries can contact us at +1.516.624.2500 in the Americas, +44.203.326.0140 in Europe, +65.6592.0290 in Asia-Pacific or visit www.abiresearch.com.

6 Blockchain Questions Your Boss Needs Answered Now

Oct. 19, 2017, 10:48 a.m.

  Question 1: What is blockchain? At its core, blockchain is a public ledger technology that uses distributed consensus mechanisms and cryptography (digital signatures and cryptographic hashing) to provide an authoritative and unalterable record of secure transactions. Question 2: Blockchain and bitcoin are the same, right? Not quite. All bitcoin ...


Read more...

Forget Autonomous Cars - Mining Rocks and Telcos Should Care

July 20, 2017, 9:43 a.m.
Lian Jye Su, Senior Analyst

"We were doing V2V ten years ago, before V2V became cool!" This is what a CEO of a Wi-Fi mesh vendor told us, whose client portfolio includes 120 mines across the world. That's right, V2V, or vehicle-to-vehicle communications, one of the hottest use cases in 5G, has existed in ...


Read more...

Petya Learns its WannaCry Lesson

June 27, 2017, 3:49 p.m.
Michela Menting, Research Director

The rapid spread of the Petya ransomware is unfortunate yet unsurprising. The WannaCry attack should have been a wake-up call for organizations worldwide of the ease with which malicious actors are profiting from increased connectivity and shoddy cybersecurity. Instead, it provided a valuable case study to cybercriminals about the widespread ...


Read more...

Getting Ahead of Phishing

April 18, 2017, 9:06 a.m.
Michela Menting, Research Director

Phishing attacks continue to be one of the most popular methods of illegitimately obtaining funds, identities, and credentials.  Social engineering, at its best, can entice users to pay over large sums of money, and provide access to private and confidential data that is normally locked down.   The activity has evolved ...


Read more...

Night of the Living Zombie Botnets

March 28, 2017, 6:20 a.m.
Dimitrios Pavlakis, Industry Analyst

Zombie computers, botnets, DDOS, DNS attacks, ransomware - all can be fueled by hordes of insecure devices and malware-infested systems. Devices that have been infected with a specific type of malware which allows stealing of personal data, controlling critical functions, has keylogger and remote access capabilities is usually refer to as ...


Read more...