The Telecom Sector
ENEA is acquiring signaling and messaging security specialist, AdaptiveMobile Security. Customers should welcome this – they look like a good fit.View the Briefing
Oracle Communications has critical capabilities and expertise in building, operating and securing telecom network functions, cloud native development environments and public cloud infrastructure.View the Briefing
The heightened threat posed by SolarWinds-type cyber attacks, bans on using Huawei, and chipset shortages, point to the need for a revolution in telco supply chain management. View the White Paper
The pandemic has made us even more dependent on our home networks and even more vulnerable to cyber threats. This White Paper, sponsored by Allot, points to the unique contribution that ISPs can make to securing the home router.View the White Paper
A guest blog for MEF, explaining the context behind the organization’s commitment to leading in SASE and Zero Trust standardization. View the blog
Trustwave was a poor fit for Singtel right from the start. The parent company should move forward with a sale View the Briefing
Vodafone Business is finally making a respectable commitment to security services. Trebling security revenues by 2025 looks achievable. View the briefing
A new HardenStance blog on Light Reading proposing an approach to collaborating on AI security standards that can complement Orange’s new Data & AI Ethics Council. View the blog
My guest blog for Palo Alto Networks, setting out the “Four ‘P’s of 5G Network Visibility”: visibility into protocols, perimeters, permissions and partners.” View the blog
Telekom Security is focusing on the Central European markets of Germany, Austria and Switzerland. M&A activity may even prioritize the U.S. before the big European markets like France and the UK.View the Briefing
Looking into some recent real world telco security incidents highlights just how unhelpful a myopic focus on APTs, Chinese vendor software and 3GPP features can be to telco security.
ETSI is doing some excellent work to fill a glaring gap in cyber security standards - how you secure AI algorithms.