Technology & Solutions

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: Deploying STIR/SHAKEN as a Service

All but the largest telecom operators should be looking at deploying the STIR/SHAKEN standard for blocking unwanted calls as a service, managed by a vendor partner, rather than building out their own infrastructure.

Briefing: Deploying STIR/SHAKEN as a Service

White Paper: What to Expect from MDR and MDR Providers

Managed Detection and Response (MDR) is a critical cybersecurity service category. Sponsored by AT&T, Secureworks, Fortinet and ElevenPaths, this White Paper guides users on what to expect both from their provider and themselves in an MDR partnership.

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: MITRE’s ATT&CK Evals Are Out: Cheers!

The new MITRE ATT&CK Evaluations offer free access to high quality, comparative data on EDR product detection capabilities against APTs on an unprecedented scale. Those that need to - and know how to - can make good use of this data.

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: New STIX & TAXII Releases Approved

The new open standard STIX and TAXII 2.1 releases have been approved by OASIS. A new self-certification program should help drive adoption and enable SOC teams to arrive at faster time to detection and time to mitigation.

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: Orange Funds New CI/CD Security Tool

Orange Polska has released Mixeway, an open source CI/CD security orchestration tool. It needs a lot more work but the GUI and aspiration to correlate vulnerability testing across security tools make it worth taking a look at.

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: A10 Helps SKT Build Leadership in 5G

SKT is a world-leader in 5G. This HardenStance Briefing depicts the operator's strategy for 5G services and applications and the contribution A10 Networks is making to SKT's supporting network and network security infrastructure.

Briefing: Deploying STIR/SHAKEN as a Service

White Paper: A Blueprint for a Cloud Native Telco

Cloud Native principles and tools are now the only way forward for telcos to achieve their digital transformation goals. This White Paper articulates what this means in terms of working practices, development and operations models and new security requirements.

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: Ericsson and Nokia Complete 5G CyberHack

80 hackers gathered in Oulu, Finland, over the last week-end of November 2019 to crawl all over Ericsson and Nokia's 5G network products and see what flaws they could find. HardenStance attended and published this Briefing on what happened and why it matters.

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: Telcos Invest in Fake Infrastructure

Some telcos are investing in deception technology. According to Attivo Networks, one telco customer found enough unauthorized and malicious behaviour by employees to warrant firing them on the spot. There are telecom infrastructure use cases too.

Briefing: Deploying STIR/SHAKEN as a Service

White Paper: Next Steps in Playbook-Driven Cyber Security

This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.  

Report: Security Imperatives for Digital Transformation

Report: Security Imperatives for Digital Transformation

The TM Forum commissioned HardenStance to research and write a report on some of the security challenges faced by telecom operators as they undergo digital transformation - and best practice as regards mitigating them.    

Briefing: Deploying STIR/SHAKEN as a Service

Briefing: A New Window into an OpenC2 World

The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.

The Telecom Threat Intelligence Summit 2026

Register for free email notifications

Be first to get the latest reports from HardenStance.

Business email addresses only. All fields required.

Unless you also register for a HardenStance webinar or event, as a subscriber to reports your contact details will not be shared with any third party whatsoever.