Menú

Informes

Descargue nuestros últimos informes sobre seguridad e inteligencia de la red 5G, mensajería y señalización, que le ayudarán a adelantarse a los atacantes.

Defending Telecoms Against Nation State Cyber Threats

Defending Telecoms Against Nation State Cyber Threats

Download >

Spectrum of Violence: Mobile Network-enabled Attacks in Hybrid Warfare

Spectrum of Violence: Mobile Network-enabled Attacks in Hybrid Warfare

Download >

Mensajería para el futuro: Protegiendo los SMS en 5G

Mensajería para el futuro: Protegiendo los SMS en 5G

Descargar >

A Slice in Time: Slicing Security in 5G Core Networks

A Slice in Time: Slicing Security in 5G Core Networks

Descargar >

Learnings from real world telco security incidents

Learnings from real world telco security incidents

Descargar >

Securing the Path from 4G to 5G

Securing the Path from 4G to 5G

Descargar >


Simjacker Technical Paper

Simjacker Technical Paper

Descargar >

A New Dawn in Security: Who is Responsible for the Protection of a Nation’s Critical Communications Infrastructure?

A New Dawn in Security: Who is Responsible for the Protection of a Nation’s Critical Communications Infrastructure?

Descargar >

5G: La seguridad de las cosas que está por venir

5G: La seguridad de las cosas que está por venir

Descargar >

Convirtiendo el Gris en Oro

Convirtiendo el Gris en Oro

Descargar >

Shielding the Core - An Analysis of Real World Attacks on the SS7 Network

Shielding the Core - An Analysis of Real World Attacks on the SS7 Network

Descargar >

Enterprise Security-as-a-Service Delivered by Communication Service Providers

Enterprise Security-as-a-Service Delivered by Communication Service Providers

Descargar >

Attacking the CASL

Attacking the CASL

Descargar >

Code of Conduct for the Messaging Wars

Code of Conduct for the Messaging Wars

Descargar >

The Mobile Security Landscape in 2014 Securing BYOD in today’s connected workplace

The Mobile Security Landscape in 2014 Securing BYOD in today’s connected workplace

Descargar >

GSIM 9 – Courting trouble: why Wi-Fi hotspots need to be part of the safety debate

GSIM 9 – Courting trouble: why Wi-Fi hotspots need to be part of the safety debate

Descargar >

GSIM 8 – Mobile Security Threats: Conflict, Combat and Culture in the US

GSIM 8 – Mobile Security Threats: Conflict, Combat and Culture in the US

Descargar >

GSIM 7 - Protecting the Borderless Network

GSIM 7 - Protecting the Borderless Network

Descargar >

GSIM 6 - Ultimate Network Defence - Fighting the Rising Tide of SMS spam

GSIM 6 - Ultimate Network Defence - Fighting the Rising Tide of SMS spam

Descargar >

GSIM 4 - machine-to-machine: future threat?

GSIM 4 - machine-to-machine: future threat?

Descargar >

GSIM 3 - The True Cost of Free

GSIM 3 - The True Cost of Free

Descargar >

GSIM 2 - Mobile Trust & Security Barometer

GSIM 2 - Mobile Trust & Security Barometer

Descargar >

GSIM 1

GSIM 1

Descargar >

US SMS Spam Ecosystem

US SMS Spam Ecosystem

Descargar >

Mobile Network Security: The Challenges & Solutions in an LTE Landscape

Mobile Network Security: The Challenges & Solutions in an LTE Landscape

Descargar >