<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

How Fraudsters are overcoming increased security

This is where an integrated approach to security and fraud management is required, so that informati...

Miguel Reis   |     21 March 2018

48 million Twitter accounts may be fake

Approximately 40% of CSP's bad debt is related to subscription fraud. As more businesses use apps th...

Helder Ribeiro   |     9 March 2018

5 Reasons to visit this year's #MWC18

This year’s event theme is focused on ‘creating a better future’. Here is a quick summary of how WeD...

Rui Paiva   |     22 February 2018

Preparing for GDPR: Review your data integration

All you need to know about integrating data for your Risk Management Telecom review. Catch up on it ...

Carlos Marques   |     1 February 2018

No Egos when it comes to Identity and Access Management

When announcing the ‘John McAfee Privacy Phone’ in 2017, it was claimed that the phone would be untr...

Carlos Marques   |     30 January 2018

Bad data is just like fake news

It’s fascinating how our industry continuously comes up with new terms for something that is pre-exi...

Tony Poulos   |     15 January 2018

Subscribe Our Blog

Let Us Know What You Thought about this Post.

Put your Comment Below.