Third-Party
Telecom Security
Zimperium’s Global Mobile Threat Report 2024
70% of businesses fail to adequately secure personal devices used for work, reinforcing the belief held by 55% of professionals that smartphones are the most exposed endpoints in their organization according to Zimperium’s new report (Published October 2024). View the Report

V2.0 of GSMA’s “Post Quantum Guidelines for Telecom Use Cases”
V2.0 of ‘Post Quantum Guidelines for Telecom Use Cases’ supports a detailed migration planning exercise for operators and technology vendors, including an analysis of standards, functional architecture and performance for each use case (published October 2024).
View the Report

Bitdefender’s “Cybersecurity Trends among Telco Customers in the U.S.”
Bitdefender’s “Cybersecurity Trends among Telco Customers in the U.S” (Published September 2023). View the Survey

Netscout’s 1H 2024 DDoS Threat Intelligence report
“Issue 13: An Era of DDoS Hactivism” (published October 2024). View the Report

Nokia’s Threat Intelligence Report 2024
Nokia’s 2024 threat report shows that the number and frequency of DDoS attacks has grown from one or two a day to well over 100 per day in many networks (Published October 2024). View the Report

The Communications Sector Coordination Council Annual Report 2024
The annual report highlighting the work of the CSCC and its inputs into the other private and public sector bodies charged with defending America’s critical infrastructure against cyber and other threats (published 2024). View the Document

The ITU’s Global Cybersecurity Index 2024
The 5th edition of the ITU’s Global Cybersecurity Index (GCI) measures the commitment of countries to cybersecurity across the five pillars of Legal, Technical, Organizational, Capacity Development, and Cooperation (Published September 2024). View the Document

GSMA Key Management Version 7.0
This document outlines procedures for GSMA members and eligible non-members to exchange certificates and key material to facilitate use cases that rely on public key cryptographic algorithms. (published September2024). View the Document

ENISA’s “Threat Landscape 2024”
ENISA analyzed several thousand publicly reported cybersecurity incidents and events to arrive at its ‘2024 Threat Landscape’ report. Threats to availability feature most prominently, followed by ransomware threats (published September 2024). View the report

The Allot H1 2024 Cyber Threat Report
The most prevalent cyber threats Allot is seeing targeting mobile and fixed internet users, categorized into browser-related threats, malicious links and sites, and remote-control threats (published August 2024). View the report

The GSMA’s ‘IoT Security Guidelines – April 2024’
The GSMA’s ‘IoT Security Guidellines’ promote best practice for the secure design, development and deployment of hashtag#IoT services, and provide a mechanism to evaluate security measures (April 2024). View the Guidelines

A Zero Trust Architecture for Secure ORAN ORAN Alliance Security Working Group (WG 11) February 2024 report
The ORAN Alliance Security Working Group’s (WG 11) “A Zero Trust Architecture for Secure ORAN” (Published May 2024). View the Report