Menu
SS7: 2G/3G's weakest link
March 12, 2020

SS7: 2G/3G's weakest link

Following our new SS7 Security Analysis Report, we are holding the webinar "SS7: 2G/3G's weakest link" on March 12. Both mobile operators and cybercriminals make heavy use of the SS7 protocol on previous-generation networks. SS7 is old and vulnerable to attacks, yet will underpin the advanced networks of tomorrow. Learning more about SS7 is mission-critical for securing increasingly complex environments. Register the webinar to learn all about the ins and outs of SS7 for a smooth transition to 5G.
Simjacker: how to protect your network from the latest hot vulnerability
September 19, 2019

Simjacker: how to protect your network from the latest hot vulnerability

The latest finding in the mobile security, the so-called Simjacker, in fact, happens to be an already long-found vulnerability. It has been 5 years, since the Positive Technologies team disclosed a potential threat in this area. This webinar contains all the must-know facts about Simjacker, step-by-step process of how such attacks are performed in real life, and recommendations on how to protect your network from being hacked by Simjacker.
5G roll-out: a time of huge opportunity, massive investment and critical decisions
December 20, 2019

5G roll-out: a time of huge opportunity, massive investment and critical decisions

With our new whitepaper publication attracting so much interest, we have decided to hold a webinar to discuss current trends and developments in 5G security. The presentation will reference our latest research findings and expand to investigate the business implications. Our expert Jimmy Jones will reveal answers to the top FAQs on 5G, examine the most concerning risks and challenges, and most importantly discuss the preventive measures you need to take now.
On the Verge of Fraud
November 7, 2019

On the Verge of Fraud

Signaling security solutions are critical for protecting core networks. Telecom fraud these days can take many forms, from pervasive spam to gray routing and SIM farming. The good news is that it's possible to identify threats and attack scenarios for a solid knowledge of the potential risks. Doing so requires approaching the issues seriously and being aware of the ways to mitigate vulnerabilities. Watch the webinar to learn the types of SMS fraud attacks and detection techniques. With them, telecom companies can keep threats out and prevent revenue losses. Do you want to stay ahead of fraud and be protected without fear of costly failure?
Signaling security essentials. Ready, steady, 5G!
August 29, 2019

Signaling security essentials. Ready, steady, 5G!

A big challenge for mobile network operators in the new, ever-evolving 5G era is the signaling security of the standardized protocols used in order to exchange data. Telecommunication companies face this challenge and have to be on the verge every time there is a potential hacker attack. What is the best way to approach these striking threats and even to be ready before it occurs? In our webinar, we will offer you several breakthrough strategies on how to deal with security flaws in telecom.