Menu
Toolbox for 5G security: How are you handling the European Commission's guidance?

Toolbox for 5G security: How are you handling the European Commission's guidance?

April 21, 2020
Security is in the spotlight and people are more reliant on mobile networks than ever. Securing networks must be a priority during the design stage. This is even more true now as operators begin to tackle construction of new 5G networks. Attempts to implement security as an afterthought at later stages may cost much more: operators will likely need to purchase additional equipment, at best. At worst, operators may be stuck with long-term security vulnerabilities that cannot be fixed.
What should network operators be on the lookout for during COVID-19?

What should network operators be on the lookout for during COVID-19?

April 15, 2020
Telecom networks are a crucial part of society. They provide services, applications, and communication channels that we simply cannot do without. It’s a critical industry, not just because of the billions of users connected all over the world, but because of the other industries and services that rely on the infrastructure - not least the emergency services.
Internet Of Things (IoT) Security

Internet Of Things (IoT) Security

Updated: March 11, 2020
Internet of Things (IoT) devices are rapidly growing in number worldwide. Learn about the main challenges to IoT security and how to manage them.
First steps for mitigating Simjacker-related risks right now

First steps for mitigating Simjacker-related risks right now

September 17, 2019
There is nothing that subscribers can do about Simjacker attacks. The vast majority of mobile operators provide SIM cards with STK pre-installed. It is not possible to disable STK on the mobile device itself. Therefore, the job of security falls squarely with mobile operators. And now for the good news. Almost any operator equipment that handles SMS traffic has the capability to reduce the risk of Simjacker exploitation.