Cyber-Telecom Crime Report 2019

February 20, 2019

This paper is written to serve as a guide of sorts to help stakeholders in the industry navigate the telecom threat landscape. As such, we begin by giving an overview of how telecom fraud or crimes translate to monetary gains for criminals. Then we go through key concepts of the telecom infrastructure, including the history of telecom threats. With the basics set, the meat of our discussion falls on several threats that we enumerated and divided into two kinds: infrastructure attacks and network-based telecom frauds.

Spotlight

Autobahn Security

Autobahn Security is a SaaS platform that saves IT security experts time and empowers IT teams to make networks more secure. Our platform serves as the single pane of glass that aggregates, filters and prioritizes vulnerabilities from different scanners and turns them into easy-to-understand remediation guides. Our so-called Cyber Fitness Workouts enable even IT teams with no security knowledge to quickly and efficiently remediate vulnerabilities. What differentiates us is that our security engineers manually reassess all vulnerabilities from a hacker's perspective. We also curate each of our remediation guides through our security engineers and technical writing team. We scale expert knowledge. In addition our exclusive Hackability Score provides unique reporting and benchmark capabilities.

OTHER WHITEPAPERS
news image

Amplify Your Ransomware Defenses: Protect, Detect and Recover

whitePaper | December 28, 2022

The Cohesity platform provides exceptional value for organizations to protect and manage vast enterprise data stores. But cyber criminals target data stores for various nefarious activities, most notably ransomware and data theft. Ransomware continues as the leading threat as it provides easy monetization, and therefore cyber criminals work non-stop to compromise organizations.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Data Services Cloud Console Security Guide

whitePaper | March 2, 2023

Cloud-based management from Hewlett Packard Enterprise offers many advantages for both data infrastructure and the data itself. Data Services Cloud Console (DSCC) is the HPE cloud-based application for current and future data and storage management.

Read More
news image

GBM Security Whitepaper

whitePaper | November 10, 2019

We are living in an era of digital disruption. Multiple industries are being disrupted, or fear being disrupted in the near future. Business models are evolving to cater to the dynamic markets and digital transformation that seems to be the answer to changing business models. Digital transformation is rapidly becoming a key priority in most industries, as organizations adapt to changing markets by leveraging technologies to build IT-centric business models. In general, organizations are using digital transformation to reach their goals of achieving greater agility, improving operational efficiency, improving customer experiences, and developing new revenue streams.

Read More
news image

2022 Cyber Security Report

whitePaper | July 25, 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically accelerated as businesses embraced hybrid and remote working arrangements, but the same questions around security maturity that plagued many businesses in 2020 persisted through 2021.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More

Spotlight

Autobahn Security

Autobahn Security is a SaaS platform that saves IT security experts time and empowers IT teams to make networks more secure. Our platform serves as the single pane of glass that aggregates, filters and prioritizes vulnerabilities from different scanners and turns them into easy-to-understand remediation guides. Our so-called Cyber Fitness Workouts enable even IT teams with no security knowledge to quickly and efficiently remediate vulnerabilities. What differentiates us is that our security engineers manually reassess all vulnerabilities from a hacker's perspective. We also curate each of our remediation guides through our security engineers and technical writing team. We scale expert knowledge. In addition our exclusive Hackability Score provides unique reporting and benchmark capabilities.

Events