Technology & Solutions
ENEA is acquiring signaling and messaging security specialist, AdaptiveMobile Security. Customers should welcome this – they look like a good fit.View the Briefing
Oracle Communications has critical capabilities and expertise in building, operating and securing telecom network functions, cloud native development environments and public cloud infrastructure.View the Briefing
The pandemic has made us even more dependent on our home networks and even more vulnerable to cyber threats. This White Paper, sponsored by Allot, points to the unique contribution that ISPs can make to securing the home router.View the White Paper
A guest blog for MEF, explaining the context behind the organization’s commitment to leading in SASE and Zero Trust standardization. View the blog
The pandemic’s legacy for cyber security should be a secure innovation culture; convergence of network and security at the edge; better segmentation of network domains at home; and concerted action against ransomware. View the White Paper
Vodafone Business is finally making a respectable commitment to security services. Trebling security revenues by 2025 looks achievable. View the briefing
A new HardenStance blog on Light Reading proposing an approach to collaborating on AI security standards that can complement Orange’s new Data & AI Ethics Council. View the blog
My guest blog for Palo Alto Networks, setting out the “Four ‘P’s of 5G Network Visibility”: visibility into protocols, perimeters, permissions and partners.” View the blog
Telekom Security is focusing on the Central European markets of Germany, Austria and Switzerland. M&A activity may even prioritize the U.S. before the big European markets like France and the UK.View the Briefing
Looking into some recent real world telco security incidents highlights just how unhelpful a myopic focus on APTs, Chinese vendor software and 3GPP features can be to telco security.
Facebook, YouTube and Twitter aren't going to reduce the risk posed by Fake News down to the minimal level needed on their own. It's time they collaborated to get this done - here's how.
ETSI is doing some excellent work to fill a glaring gap in cyber security standards - how you secure AI algorithms.