12 Feb 2020 | People and Processes, Research & White Papers, Technology & Solutions, The Telecom Sector
Cloud Native principles and tools are now the only way forward for telcos to achieve their digital transformation goals. This White Paper articulates what this means in terms of working practices, development and operations models and new security requirements.
4 Feb 2020 | Companies, Industry Collaboration and Standards, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector
80 hackers gathered in Oulu, Finland, over the last week-end of November 2019 to crawl all over Ericsson and Nokia’s 5G network products and see what flaws they could find. HardenStance attended and published this Briefing on what happened and why it...
29 Jan 2020 | Companies, Enterprise Security, Research & White Papers, Technology & Solutions, The Telecom Sector
Some telcos are investing in deception technology. According to Attivo Networks, one telco customer found enough unauthorized and malicious behaviour by employees to warrant firing them on the spot. There are telecom infrastructure use cases too.
24 Sep 2019 | Enterprise Security, Industry Collaboration and Standards, People and Processes, Research & White Papers, Technology & Solutions
This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.
14 Aug 2019 | Research & White Papers, Technology & Solutions, The Telecom Sector
The TM Forum commissioned HardenStance to research and write a report on some of the security challenges faced by telecom operators as they undergo digital transformation – and best practice as regards mitigating them.
7 Aug 2019 | Enterprise Security, Industry Collaboration and Standards, People and Processes, Research & White Papers, Technology & Solutions
The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.