Customer & Media Citations
Interview with HardenStance Promoted by NETSCOUT
NETSCOUT promoted Director of Threat Intel, Richard Hummel’s interview with HardenStance on Hacktivism Driving DDoS Threats. View the blog
Blog on threat intel sharing published by Cyber Threat Alliance
The Cyber Threat Alliance published a HardenStance blog on threat intel sharing in the telecom sector View the blog
Enea’s talk at HardenStance’s Telecom Threat Intelligence Summit
Enea’s website features Jelte Janson’s talk at HardenStance’s TTIS2024. View the post
Guest Total Telecom Blog on Cyber Threats to Submarine Cables
Heightened risk to submarine cable systems points to higher spend on cybersecurity. View the blog
White Paper posted by Noetic Cyber
HardenStance comments cited by Whalebone
Czech Republic-based Whalebone cited HardenStance’s comments about the company in a new report on ‘Telco Strategies for Consumer Security.” View the post
Cited in a Telecoms.com article by Nokia’s Nils Ahrlich
Nokia cited HardenStance research in this article about cybersecuiurity regulation of the telecom sector. View the post
Blog: Psssst! MWC is gonna be way better than last year!
Despite the general gloom hanging over the telecom sector, I already know that from a cybersecurity perspective, this year’s Mobile World Congress will be a lot more inspiring than last year’s. View the blog
Blog: Do telcos care about consumer cybersecurity? Do Consumers?
The idea that consumers don’t care about cybersecurity is a self-serving tenet of the cybersecurity industry that will take some shifting. Telcos have a nuanced, role in driving that change. They’re doing well in some respects, not so well in others. View the blog
Cited in an ENEA PR on Threat Intel for National Security Agencies
HardenStance was cited in this new ENEA release announcing the tailoring of its portoflio to the unique requirements of national security agencies for mobile network signaling intelligence.View the press release
Guest TM Forum blog on Cyber Risk Management in Telecoms
Traditional tick-box regulatory compliance is being subordinated to broader risk management frameworks as the lodestar guiding CSP cybersecurity strategies. View the blog
Guest Mobile Europe blog on Cisco’s acquisition of Splunk
The telecom sector is likely to be a lead target for Cisco leveraging its acquisition of Splunk. View the blog