Migrating mobile networks to 5G: a smooth and secure approach
Join our expert, Pavel Novikov, for the webinar "Migrating mobile networks to 5G: a smooth and secure approach" on October 1, 2020. Register to learn how to safely and systematically bring mobile networks up to 5G.
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
Our live webinar, hosted on August 6 by our experts Federico Aureli, Technical Security Specialist, and Milan Brezina, Telecom and SMS fraud expert, reveals the trending topics in SS7 security and explains why SS7 protocol has to come into the spotlight during the design stage in the era of 5G.
5G mission diary: Houston, we have a problem
In our upcoming webinar PT experts Paolo Emiliani, Head of Pre-Sales Engineering team, and Jun Kim, Pre-Sales Engineer, Korea & Asia-Pacific, will help you to navigate the tricky path to 5G deployment.
Mitigación del fraude en telecomunicaciones con ciberseguridad
La seguridad en señalización se mantiene como una de las soluciones de mayor prioridad para las redes core.
Positive approach to security of Core networks
Why, in your opinion, is there fraudulent activity happening in the telecoms and banking industry? Is it the greediness of the fraudsters? To put it simply – it’s because the criminals can do so. It is a lack of security and technical expertise that allows misconduct and malicious activity to happen. Therefore, mobile network operators (MNOs) have to make it impossible for cyber criminals to launch cyberattacks on their network systems.
SS7: 2G/3G's weakest link
Following our new SS7 Security Analysis Report, we are holding the webinar "SS7: 2G/3G's weakest link" on March 12. Both mobile operators and cybercriminals make heavy use of the SS7 protocol on previous-generation networks. SS7 is old and vulnerable to attacks, yet will underpin the advanced networks of tomorrow. Learning more about SS7 is mission-critical for securing increasingly complex environments. Register the webinar to learn all about the ins and outs of SS7 for a smooth transition to 5G.
Simjacker: how to protect your network from the latest hot vulnerability
The latest finding in the mobile security, the so-called Simjacker, in fact, happens to be an already long-found vulnerability. It has been 5 years, since the Positive Technologies team disclosed a potential threat in this area. This webinar contains all the must-know facts about Simjacker, step-by-step process of how such attacks are performed in real life, and recommendations on how to protect your network from being hacked by Simjacker.
5G roll-out: a time of huge opportunity, massive investment and critical decisions
With our new whitepaper publication attracting so much interest, we have decided to hold a webinar to discuss current trends and developments in 5G security. The presentation will reference our latest research findings and expand to investigate the business implications. Our expert Jimmy Jones will reveal answers to the top FAQs on 5G, examine the most concerning risks and challenges, and most importantly discuss the preventive measures you need to take now.
On the Verge of Fraud
Signaling security solutions are critical for protecting core networks. Telecom fraud these days can take many forms, from pervasive spam to gray routing and SIM farming. The good news is that it's possible to identify threats and attack scenarios for a solid knowledge of the potential risks. Doing so requires approaching the issues seriously and being aware of the ways to mitigate vulnerabilities. Watch the webinar to learn the types of SMS fraud attacks and detection techniques. With them, telecom companies can keep threats out and prevent revenue losses. Do you want to stay ahead of fraud and be protected without fear of costly failure?
Signaling security essentials. Ready, steady, 5G!
A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs? In our webinar, we will offer you several breakthrough strategies on how to deal with security flaws in telecom.