Third-Party
Regulation & Policy
GSMA’s “Mobile Device Theft – State of Affairs”
The need for better collaborative intelligence sharing of information on the techniques and tactics employed by criminals is one of the take-aways from this new GSMA report (published February 2025). View the Report
GSMA’s “Mobile Telecommunications Security Landscape 2025”
GSMA’s seventh annual Mobile Telecommunications Security Landscape report 2025 (published February 2025). View the Report
CTA’s “Cybersecurity in the Age of Gen AI Part 2”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part 2 – Navigating Cyber threats to Gen AI systems (Published January 2025). View the report
CTA’s “Cybersecurity in the Age of Gen AI Part 1”
Cyber Threat Alliance’s Cybersecurity in the Age of Gen AI Joint Part I – Combating GenAI Assisted Cyber Threats (Published January 2025). View the report
Vulnerability Disclosure Policy Usage in Global Consumer IoT in 2024
64% of the companies surveyed didn’t have a way for security researchers to contact them acording to this new Copper Horse report on VDP usage in consumer IoT (Published November 2024). View the Report
V2.0 of GSMA’s “Post Quantum Guidelines for Telecom Use Cases”
V2.0 of ‘Post Quantum Guidelines for Telecom Use Cases’ supports a detailed migration planning exercise for operators and technology vendors, including an analysis of standards, functional architecture and performance for each use case (published October 2024).
View the Report
The Communications Sector Coordination Council Annual Report 2024
The annual report highlighting the work of the CSCC and its inputs into the other private and public sector bodies charged with defending America’s critical infrastructure against cyber and other threats (published 2024). View the Document
The ITU’s Global Cybersecurity Index 2024
The 5th edition of the ITU’s Global Cybersecurity Index (GCI) measures the commitment of countries to cybersecurity across the five pillars of Legal, Technical, Organizational, Capacity Development, and Cooperation (Published September 2024). View the Document
GSMA Key Management Version 7.0
This document outlines procedures for GSMA members and eligible non-members to exchange certificates and key material to facilitate use cases that rely on public key cryptographic algorithms. (published September2024). View the Document
ENISA’s “Threat Landscape 2024”
ENISA analyzed several thousand publicly reported cybersecurity incidents and events to arrive at its ‘2024 Threat Landscape’ report. Threats to availability feature most prominently, followed by ransomware threats (published September 2024). View the report
The GSMA’s ‘IoT Security Guidelines – April 2024’
The GSMA’s ‘IoT Security Guidellines’ promote best practice for the secure design, development and deployment of hashtag#IoT services, and provide a mechanism to evaluate security measures (April 2024). View the Guidelines
Verizon’s 2024 Data Breach Investigations Report (DBIR)
This year Verizon’s DBIR shows 25% of attacks in APAC are motivated by espionage – significantly greater than in Europe and North America (published 1st May 2024). View the Report
