A&B Handshake: A Simple Way to Control Voice Fraud via an Out-of-Band Connection between A & B Operators

May 2020

A&B Handshake: A Simple Way to Control Voice Fraud via an Out-of-Band Connection between A & B Operators

interview with Sergey Okhrimenko

An A&B operator handshake provides a simple, low-cost way to deliver an out-of-band connection to identify fraudulent voice calls in real-time, better manage fraud disputes, and pave the way for greater law enforcement help.

Black Swan Solution Guide: SHAKEN / STIR Calling Number Verification & Fraud Alerting

May 2020

Black Swan Solution Guide: SHAKEN / STIR Calling Number Verification & Fraud Alerting

interview with Chris Drake & Gary Richenaker

SHAKEN/STIR is the telecom industry’s first step toward reviving trust in business telephony — and has recently launched in the U.S. market.  This Solution Guide features commentary from technology leaders at iconetiv, a firm heavily involved in the development of SHAKEN.

NuData Analyzes Behaviors to Stop Automated Fraud Attacks & Identify Fake Customers Inside the Firewall

April 2020

NuData Analyzes Behaviors to Stop Automated Fraud Attacks & Identify Fake Customers Inside the Firewall

interview with Robert Capps

A cybercrime expert examines the role of behavioral analysis and explains why it’s critical even when the device identity is known.  He also explains how human-like automation is detected and why an analysis of browser level activity delivers an extra edge in identifying fraud attacks.

Positive’s Research Keeps Telecoms One Step Ahead of Signaling Hackers and Fraud Disasters

March 2020

Positive’s Research Keeps Telecoms One Step Ahead of Signaling Hackers and Fraud Disasters

interview with Jimmy Jones

And joining us to discuss signaling threats and protection techniques is Jimmy Jones, Positive Technologies’ Telecom Business Development Lead. Jimmy does a great job of simplifying An expert on signaling security: walks through signaling threats; shows how hackers penetrate and capture IMSIs; analyzes the growing signaling bypass threat; and explains the strategies taken by security-savvy telecoms.

Allot’s Mobile Security: Network-based Protection that 21 Million Consumers & SMBs Subscribe to — at One Euro a Month

December 2019

Allot’s Mobile Security: Network-based Protection that 21 Million Consumers & SMBs Subscribe to — at One Euro a Month

interview with Moshe Elias

Protecting mobile users from online threats is a major opportunity for telecoms and a service very much in demand.  Learn about the adoption, challenges, and marketing innovations driving mobile device cybersecurity protection.

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services

December 2019

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services

interview with Stephen Spellicy

How high-speed communications, advanced security and analytics technology gets delivered to the IoT OEMs and telecom providers.  Learn why security, performance, cost and reliability are key IoT challenges.

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients

November 2019

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients

interview with Kiran Zachariah

A leader in IoT security monitoring and protection services explains the many challenges of IoT security and how his firm is exploiting its deep research and honeypots to protect telecom, industrial, and automotive OEM clients.

Metadata Toolkit: Mediating the IP Network in Support of Fresh Security Apps

September 2017

Metadata Toolkit: Mediating the IP Network in Support of Fresh Security Apps

interview with Bob Noel

Mediating the IP network has always been an issue due to its sheer complexity.  But now a clever software supplier uses metadata to abstract network events and economically enable the development of near-real-time security apps.

BT Americas Security Chief: Security is No Longer Just an IT Problem, It’s a Major Board Room Concern

July 2016

BT Americas Security Chief: Security is No Longer Just an IT Problem, It’s a Major Board Room Concern

interview with Jason Cook

A global expert on security explains six key motivators that are driving enterprises and telecoms to strengthen their security protection.

A Big Win/Win: Protecting Mobile Users While Boosting Revenue

January 2016

A Big Win/Win: Protecting Mobile Users While Boosting Revenue

by Dan Baker

Increasingly mobile operators will turn to the cloud to find compelling services.  This white paper explains the benefits of a cloud security service that detects and blocks malware.

More Stories in Index

Recent Articles