January 2023
interview with George Cray & Tom Sawanobori
A fraud control solution vendor and national wireless association have teamed
up to drive adoption of a new, central cloud service for enterprise vetting
and validation to leverage STIR/SHAKEN info for telecoms in the U.S. market.
October 2020
interview with Malick Aissi
A classic case of risk management driving a major boost in a telecom’s
business. Learn details on the commercial offer, antifraud ystem upgrades,
Do It Yourself customer portal and reporting.
July 2020
interview with Arnd Baranowski & John Haraburda & Igor Skutsenya & Colin Yates
A virtual webinar where four telecom fraud control experts give their perspective
on Wangiri, the callback fraud. They discusses strategies and explain
the solutions they offer to service providers.
July 2020
interview with Igor Skutsenya
A Guide to a new and unique on-demand network service enabling fraud-risky international
voice traffic to be monitored (and either alerted or blocked) as that traffic
is routed through a wholesaler on its way to its final destinations.
March 2020
interview with Sundeep Tengur
A leading cross-industry fraud analytics firm provides: a picture of telecom
threats; perspective on subscription and onboarding fraud; parallels to fraud
control in banking; and a rundown on its telco-specific approach to solving
fraud problems in a holistic way.
December 2019
interview with Sergey Okhrimenko
An international wholesaler gives details about a new traffic pumping fraud
dubbed Wangiri 2.0. The fraud is hard to detect and targets businesses
who do lots of international calling.
October 2019
interview with Miguel Carrero
Security-breach-driven fraud is on the increase as fraudsters gain deeper
knowledge of telecom spheres such as roaming. Using five fraud cases,
an expert shows how advanced signaling techniques are taking fraud control to
a higher level.
August 2019
interview with Kent McIntosh & David Yates
How is analytics being applied to next generation data threats? Learn
how tethering fraud occurs and is detected. Also discussed are: data volume
reduction at the network edge, IoT fraud concerns, and automating the healing
of high-quality 5G data services.
August 2019
interview with Jeffrey Ross
Learn about a close-to-the-network platform that blocks mobile fruad, Reading
a variety of protocols and integrated with external applications, it’s
being used to combat: Wangiri, IRSF, SIM box bypass, and mobile money fraud.