Convenient & Spam-Free: Why 800-Number Texting (8MS) is a Growing B2C Channel in North America

October 2020

Convenient & Spam-Free: Why 800-Number Texting (8MS) is a Growing B2C Channel in North America

interview with Michael Gilbert

Texting is emerging as a highly trusted and convenient ways to communicate with businesses.  An expert in texting innovations explains 8MS toll-free B2C texting and gives his perspective on texting enrichment trends in North America.

Positive Technologies: White Hat Hacking & Testing are Key to Signaling Security in the Era of 5G and IoT

September 2020

Positive Technologies: White Hat Hacking & Testing are Key to Signaling Security in the Era of 5G and IoT

interview with Jimmy Jones

A signaling security expert sorts through the white hat findings of a new report on mobile operator security vulnerabilities via the GTP protocol.  Also discussed: security challenges and priorities in the age of 5G and IoT.

A&B Handshake: A Simple Way to Control Voice Fraud via an Out-of-Band Connection between A & B Operators

May 2020

A&B Handshake: A Simple Way to Control Voice Fraud via an Out-of-Band Connection between A & B Operators

interview with Sergey Okhrimenko

An A&B operator handshake provides a simple, low-cost way to deliver an out-of-band connection to identify fraudulent voice calls in real-time, better manage fraud disputes, and pave the way for greater law enforcement help.

Black Swan Solution Guide: SHAKEN / STIR Calling Number Verification & Fraud Alerting

May 2020

Black Swan Solution Guide: SHAKEN / STIR Calling Number Verification & Fraud Alerting

interview with Chris Drake & Gary Richenaker

SHAKEN/STIR is the telecom industry’s first step toward reviving trust in business telephony — and has recently launched in the U.S. market.  This Solution Guide features commentary from technology leaders at iconetiv, a firm heavily involved in the development of SHAKEN.

NuData Analyzes Behaviors to Stop Automated Fraud Attacks & Identify Fake Customers Inside the Firewall

April 2020

NuData Analyzes Behaviors to Stop Automated Fraud Attacks & Identify Fake Customers Inside the Firewall

interview with Robert Capps

A cybercrime expert examines the role of behavioral analysis and explains why it’s critical even when the device identity is known.  He also explains how human-like automation is detected and why an analysis of browser level activity delivers an extra edge in identifying fraud attacks.

Positive’s Research Keeps Telecoms One Step Ahead of Signaling Hackers and Fraud Disasters

March 2020

Positive’s Research Keeps Telecoms One Step Ahead of Signaling Hackers and Fraud Disasters

interview with Jimmy Jones

And joining us to discuss signaling threats and protection techniques is Jimmy Jones, Positive Technologies’ Telecom Business Development Lead. Jimmy does a great job of simplifying An expert on signaling security: walks through signaling threats; shows how hackers penetrate and capture IMSIs; analyzes the growing signaling bypass threat; and explains the strategies taken by security-savvy telecoms.

Allot’s Mobile Security: Network-based Protection that 21 Million Consumers & SMBs Subscribe to — at One Euro a Month

December 2019

Allot’s Mobile Security: Network-based Protection that 21 Million Consumers & SMBs Subscribe to — at One Euro a Month

interview with Moshe Elias

Protecting mobile users from online threats is a major opportunity for telecoms and a service very much in demand.  Learn about the adoption, challenges, and marketing innovations driving mobile device cybersecurity protection.

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services

December 2019

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services

interview with Stephen Spellicy

How high-speed communications, advanced security and analytics technology gets delivered to the IoT OEMs and telecom providers.  Learn why security, performance, cost and reliability are key IoT challenges.

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients

November 2019

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients

interview with Kiran Zachariah

A leader in IoT security monitoring and protection services explains the many challenges of IoT security and how his firm is exploiting its deep research and honeypots to protect telecom, industrial, and automotive OEM clients.

Metadata Toolkit: Mediating the IP Network in Support of Fresh Security Apps

September 2017

Metadata Toolkit: Mediating the IP Network in Support of Fresh Security Apps

interview with Bob Noel

Mediating the IP network has always been an issue due to its sheer complexity.  But now a clever software supplier uses metadata to abstract network events and economically enable the development of near-real-time security apps.

More Stories in Index

Recent Articles