What to do next if you suffer a data breach

Any type of data breach, whether due to an external hacking incident or an internal staff error, is a significant issue that needs immediate attention, writes Emma Roe, a partner

Read more

Intercede launches MyIDaaS a convenient and affordable cloud-based service for enterprises

Digital identity and credentials provider Intercede has announced MyID as a Service (MyIDaaS). It is claimed to be a convenient and affordable cloud-based ‘strong credentials’ service for enterprises.

Read more

Open source can protect your virtualised network. Here’s how.

Virtualisation has been a hot topic in telecommunications for nearly half a decade, and security concerns have remained an ever-present feature. This is not surprising given the extent to which

Read more

If the C.I.A. can compromise smartphones as Wikileaks says, is it still possible to protect your privacy?

In the largest leak of C.I.A. documents, Wikileaks has disclosed  the tools that the C.I.A. uses to hack computers, phones and smart TVs around the world.

Read more

What strategies should operators adopt to prevent telecoms fraud?

$38 billion. That’s how much telecoms fraud is costing the industry annually. Scams that originated from calls initially took the form of impersonators. But, says Graham Moore, product director at

Read more

Global Application and Network Security report finds ransom is top motivation for cyber attacks, IoT botnets a major concern

Radware®, a provider of cyber security and application delivery solutions ensuring the digital user experience for applications in virtual, cloud, and software-defined data centres, has found that hackers and companies

Read more

Only 30% of subscribers aware of risks from mobile network vulnerabilities, a third never check their bill

Research commissioned by Xura, Inc., a provider of secure, digital communications services, has revealed the extent to which mobile subscribers are unaware of vulnerabilities in their mobile operator’s network that

Read more

This is the year of connected security and software-based networks

This year will see dramatic change for mobile operators and Communications Services Providers (CSPs). This change will be driven by the continued rise of wearables, the Internet of Things (IoT),

Read more