<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

No Egos when it comes to Identity and Access Management

When announcing the ‘John McAfee Privacy Phone’ in 2017, it was claimed that the phone would be untr...

Carlos Marques   |     30 January 2018

Bad data is just like fake news

It’s fascinating how our industry continuously comes up with new terms for something that is pre-exi...

Tony Poulos   |     15 January 2018

Subscription Fraud: Old News. Never Outdated

Telcos to fight subscription fraud by combining internal and external data, feeding it into hybrid s...

Miguel Reis   |     8 January 2018

2018's Top Telecom Fraud Threats

Protect Network From Hackers. The rise of embedded SIMs (eSIMs) will grow from 108 million in 2016 t...

Bernardo Lucas   |     18 December 2017

The Ultimate Guide to Mobile Application Testing Strategy

Here’s a sobering fact every executive in the digital space should know: 88% of users have abandoned...

Bernadett Tolnai   |     7 December 2017

Three Steps To Protect Your Network From Hackers

Telecom fraud managers are confronted with a growing responsibility. Armed with superior data intell...

Bernardo Lucas   |     4 December 2017

Subscribe Our Blog

Let Us Know What You Thought about this Post.

Put your Comment Below.