May 2018

Post thumbnail

Globally, mobile operators are waking up to the risks created by vulnerabilities in the SS7 protocol, ranging from fraud and interruption of services to intercepting calls and texts and theft of other confidential data, such as a user’s current location. And while the general public may not have heard of SS7, the growing number of…

Read More VIP Protect

Post thumbnail

Used even more widely than the Internet, signaling networks link individuals, businesses, and smart IoT devices into a solid mobile ecosystem. This ecosystem depends on telecom operators to maintain reliable and protected communication. However, fundamental flaws in signaling protocols—SS7, Diameter, and GTP—and configuration errors in network equipment leave the door open to severe security threats:…

Read More TELECOM SECURITY ASSESSMENT

Post thumbnail

INDUSTRIAL SECURITY INCIDENT MANAGER:  A NEW LEVEL OF INDUSTRIAL CYBERSECURITY Modern industrial facilities are high-powered automated enterprises that control trans port, manufacture, resource allocation, and mining operations 24/7/365. It is of very high priority to ensure their safety, since an attack against such systems would not only put expensive equipment out of operation, but may…

Read More A NEW LEVEL OF INDUSTRIAL CYBERSECURITY