2 Apr 2025 | Consumer Security, HardenStance Content, Industry Collaboration and Standards, Regulation and Policy, Research & White Papers, Technology & Solutions, Threat Intelligence
HardenStance attended the Global Anti Scam Alliance’s Global Anti Scam Summit (GASS) in London last week. Here are the key takeaways.
16 Mar 2025 | Companies, Consumer Security, Enterprise Security, Industry Collaboration and Standards, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector, Threat Intelligence
Enea deployed its first voice firewall for Telecom Egypt back in 2022. Today, the company is bringing it to voice fraud prevention opportunities worldwide. Malicious caller ID spoofing is the initial use case, followed by Wangiri and Flash calls.
11 Mar 2025 | Industry Collaboration and Standards, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector, Threat Intelligence
Querying outbound mobile roaming traffic is the sweet spot in a layered approach to blocking malicious caller ID spoofing. Solutions must align with local competences, privacy and security rules, and emerging global industry guidelines.
2 Aug 2024 | Companies, Industry Collaboration and Standards, People and Processes, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector, Threat Intelligence
No time to listen to seven solid hours of HardenStance’s Telecom Threat Intelligence Summit (TTIS 2024)? This Briefing provides summary highlights of who said what.
8 May 2024 | Companies, Consumer Security, Regulation and Policy, Research & White Papers, Technology & Solutions, The Telecom Sector, Threat Intelligence
As well as being critical for optimizing provisioning and routing, Netnumber’s Number Intelligence as a Service (NIaaS) is also key for mitigating fraud like AIT, account takeover and spoofing.
20 Feb 2024 | Enterprise Security, People and Processes, Research & White Papers, Technology & Solutions, Threat Intelligence
If you’re ‘setting and forgetting’ your cybersecurity posture, you’re not managing it. Leaders should get comfortable driving cyber risk management off qualitative cyber risk assessments.