<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

6 Key Reasons a Risk Catalog Can Serve as Your North Star

Security & Risk  Regulatory & Compliance 

“My risk landscape is getting too big to manage. Prioritizing all the risks and building a...

When AI Assistants Meet Telco Operations

AI/ML  Technology Evolution & Innovation BSS/OSS 

AI, in its different forms: predictive, descriptive, prescriptive, or generative, as well ...

Next-Gen Customer Experience: How 5G Roaming is Revolutionizing Connectivity

5G Customer Experience Data Monetization

As 5G technology continues to revolutionize mobile networks, providing seamless and high-p...

The Rise of Phone Verified Account (PVA) Fraud: A New Threat to Telecom Operators

Security & Risk  AI & Analytics

Last month, I had the opportunity to attend the GSMA FASG #31 meeting in Johannesburg, whe...

The Growing Influence of eSIMs: Convenience for Travelers, Challenges for Operators

eSIM

With the increasing demand for international travel—both for business and leisure—eSIM tec...

Why Operators Can’t Wait: The Urgent Need to Accelerate AI Adoption

AI/ML  Technology Evolution & Innovation

As we head into 2025, AI has become a mainstay of how we live, learn and work. And that is...

Subscribe to our Blog

Give us your comments

Let us know what you thought about this article