<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=41671&amp;fmt=gif">

Articles on
Security & Risk 

When the Call Is a Con: The Rise of Vishing Fraud

Security & Risk  Regulatory & Compliance 

Telecom networks are the backbone of global communication, but fraudsters have also recogn...

Fighting Telecom Fraud Demands an AI-Driven Approach

Security & Risk  AI & Analytics

Worldwide, telecom service providers are under pressure to ensure a secure, reliable and h...

Are Telcos Responsible for Protecting Citizens from Fraud?

AI/ML  Security & Risk  Regulatory & Compliance 

Telecom-driven fraud is especially dangerous due to its interconnected impact. Scammers no...

6 Key Reasons a Risk Catalog Can Serve as Your North Star

Security & Risk  Regulatory & Compliance 

“My risk landscape is getting too big to manage. Prioritizing all the risks and building a...

The Rise of Phone Verified Account (PVA) Fraud: A New Threat to Telecom Operators

Security & Risk  AI & Analytics

Last month, I had the opportunity to attend the GSMA FASG #31 meeting in Johannesburg, whe...

eSIM Impact on Telecom Risk Management: Revenue Assurance & Fraud Risks

eSIM Security & Risk 

eSIM (embedded SIM) technology is transforming the telecommunications industry by embeddin...

Subscribe to our Blog

Give us your comments

Let us know what you thought about this article