The Telecom Sector
SKT is a world-leader in 5G. This HardenStance Briefing depicts the operator's strategy for 5G services and applications and the contribution A10 Networks is making to SKT's supporting network and network security infrastructure.
Cloud Native principles and tools are now the only way forward for telcos to achieve their digital transformation goals. This White Paper articulates what this means in terms of working practices, development and operations models and new security requirements.
80 hackers gathered in Oulu, Finland, over the last week-end of November 2019 to crawl all over Ericsson and Nokia's 5G network products and see what flaws they could find. HardenStance attended and published this Briefing on what happened and why it matters.
Some telcos are investing in deception technology. According to Attivo Networks, one telco customer found enough unauthorized and malicious behaviour by employees to warrant firing them on the spot. There are telecom infrastructure use cases too.
Research by the Delft University of Technology, carried out in partnership with KPN, the Dutch Ministry of Economic Affairs and others, suggests consumers may be more willing to engage in cleaning up IoT infections than they tend to be given credit for.
T-Systems wants to become Europe's largest provider of cyber security services. This HardenStance Briefing looks at how growing market share in the UK is key to achieving that goal.
The TM Forum commissioned HardenStance to research and write a report on some of the security challenges faced by telecom operators as they undergo digital transformation - and best practice as regards mitigating them.
A compromised home network threatens other users and infrastructure, not just the immediate residents. This new White Paper looks at what can be done about it and who by.
After almost twenty years competing with Check Point, Fortinet today announced higher quarterly sales than its long-time rival for the first time.
ETSI TC Cyber has released a new security standard that allows telcos to run core public telecom services in - wait for it - public clouds. Here's how it works and what it means for the telecom ecosystem.
Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.
Government and government cyber security agencies can be very helpful in getting telco security spending signed off. Telco security professionals should be looking to exploit those opportunities.