<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

Some thoughts from MWC and the role of 5G security

5G Security & Risk 

I am writing this blog from the inside of a British Airways plane, waiting to take off fro...

The entangled world of the Internet of Things. Will it deliver on its promise?

Data Monetization IoT 

It is undeniable that the Internet of Things (IoT) is booming. Indication of that is the i...

From Settlers to Global Connectivity

DNA (Deep Network Analytics)  Network & Connectivity

As settlers, we started the concept of home, and either because we needed to travel to fin...

The Shift to Automation Reaches the Point of No Return

RPA (Robotic Process Automation) 

Network enhancements that not long ago would be unthought-of or only seen in science-ficti...

Protecting the two-factor authentication system with signaling security

Security & Risk 

5G, a network of superlatives in a world of sky-high expectations. Securing your enterpris...

Mobile Money is big. Big risk.

Security & Risk 

Nearly 700. That was the number of distinct event types we counted in a one-day data dump ...

Subscribe to our Blog

Give us your comments

Let us know what you thought about this article