2 Aug 2024 | Companies, Industry Collaboration and Standards, People and Processes, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector, Threat Intelligence
No time to listen to seven solid hours of HardenStance’s Telecom Threat Intelligence Summit (TTIS 2024)? This Briefing provides summary highlights of who said what.
18 Jun 2024 | Consumer Security, HardenStance Content, Regulation and Policy, Research & White Papers, Technology & Solutions, The Business of Cyber Security, The Telecom Sector
Protection against cyber threats and scams is a key part of a FWA value proposition for end users. It’s also key to profitable FWA growth for mobile operators.
8 May 2024 | Companies, Consumer Security, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector, Threat Intelligence
As well as being critical for optimizing provisioning and routing, Netnumber’s Number Intelligence as a Service (NIaaS) is also key for mitigating fraud like AIT, account takeover and spoofing.
14 Mar 2024 | Companies, Industry Collaboration and Standards, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector
HardenStance absorbed the vibes at MWC. This snapshot review of telco security includes analysis of the key security themes of the event including AI, telecom fraud, quantum safe networks, and 5G security.
12 Mar 2024 | HardenStance Content, Industry Collaboration and Standards, People and Processes, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector
MWC was a great opportunity to gauge the telecom ecosystem’s preparations for post quantum resilience. There’s a colossal amount of work to be done but some have started. Some are even trialing and deploying pre-standard versions of the NIST PQC...
20 Feb 2024 | Enterprise Security, People and Processes, Research & White Papers, Technology & Solutions, Threat Intelligence
If you’re ‘setting and forgetting’ your cybersecurity posture, you’re not managing it. Leaders should get comfortable driving cyber risk management off qualitative cyber risk assessments.