Mobile Telecommunications Security Threat Landscape January 2019

January 31, 2019

The mobile telecommunications industry is under significant threat. Today’s threats are a realisation of traditional IP based threats within the all-IP 4G network combined with insecure legacy 2/3G generations. Moving into the 5G era the threat landscape will increase due to the new services and technologies being introduced. Continued underinvestment in appropriate technology, processes, and people has resulted in numerous threats being realised against operators. These threats will only increase as the industry diversifies its services.

Spotlight

Keypasco

Since the start in 2010 Keypasco’s award winning solution has contributed to a paradigm shift within Internet security. Keypasco’s unique patented solution uses a revolutionary new technology for user authentication and provides security to online service providers and users. By using the unique device ID on the end-user’s own device, like a smartphone, tablet or a desktop/laptop computer, we can make sure that a username and password only works on the right device and in the right location. To ensure a convenient user experience the cutting-edge technology is working in the background to maintain the security behind the provider’s ordinary application interface. The Keypasco solution opens up for new innovative FinTech business models and enables the creation of new services. Today our products provide mobile security to millions of users across the world.

OTHER WHITEPAPERS
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

Revolutionizing cybersecurity

whitePaper | October 31, 2021

FINX, a platform established since 2018 that is enabled by blockchain technology to create the world’s 1st comprehensive decentralized banking platform. FINX aspires to resolve the problem of high banking costs imposed by conventional banks and serve the unbanked market in Southeast Asia.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More

Spotlight

Keypasco

Since the start in 2010 Keypasco’s award winning solution has contributed to a paradigm shift within Internet security. Keypasco’s unique patented solution uses a revolutionary new technology for user authentication and provides security to online service providers and users. By using the unique device ID on the end-user’s own device, like a smartphone, tablet or a desktop/laptop computer, we can make sure that a username and password only works on the right device and in the right location. To ensure a convenient user experience the cutting-edge technology is working in the background to maintain the security behind the provider’s ordinary application interface. The Keypasco solution opens up for new innovative FinTech business models and enables the creation of new services. Today our products provide mobile security to millions of users across the world.

Events