<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

Connected Cars and Data Overflow

With over 200 customers - incl. some of the world’s leading blue chip organizations – WeDo Technolog...

Bernardo Lucas   |     2 April 2018

How Fraudsters are overcoming increased security

This is where an integrated approach to security and fraud management is required, so that informati...

Miguel Reis   |     21 March 2018

48 million Twitter accounts may be fake

Approximately 40% of CSP's bad debt is related to subscription fraud. As more businesses use apps th...

Helder Ribeiro   |     9 March 2018

5 Reasons to visit this year's #MWC18

This year’s event theme is focused on ‘creating a better future’. Here is a quick summary of how WeD...

Rui Paiva   |     22 February 2018

Preparing for GDPR: Review your data integration

All you need to know about integrating data for your Risk Management Telecom review. Catch up on it ...

Carlos Marques   |     1 February 2018

No Egos when it comes to Identity and Access Management

When announcing the ‘John McAfee Privacy Phone’ in 2017, it was claimed that the phone would be untr...

Carlos Marques   |     30 January 2018

Subscribe Our Blog

Let Us Know What You Thought about this Post.

Put your Comment Below.