Menu

Security : Insights

As a centre of excellence in mobile security, the AdaptiveMobile Security Threat Intelligence Unit utilises the global deployments of AdaptiveMobile's Network Protection Platform (NPP), present in over 80 operators, and provides state-of-the-art protection through the correlation and analysis of over 40 billion dark data events every day.

NEW WHITEPAPER

Securing the Path from 4G to 5G:
How to protect mobile networks and subscribers during migration

Blog

Mobile Network Security Tool Box: how to proactively protect your network

29th Jul 2020

There are a number of well-established security tools for defending and protecting networks. Many of the concepts were originally developed for the enterprise network environment and are finding use in mobile carriers. Just to clarify, when I say mobile carriers’ environment, I do not mean the enterprise systems and internal connectivity and services. I mean the subscriber service network of Radio, Core Packet, Intelligent Network and Service Platforms.

Read more >

Mobile Network Security – The Threat Cycle: Don’t just play it by ear

9th Jul 2020

Declaring any technology as 100% secure is a very dangerous statement to make, especially when the security in question is protecting something of value. Value attracts attackers, hackers and fraudsters like nothing else.

Read more >

5G Security Blog Series (Part 3):  Different Day – Same Software, Snooping and Scams!

26th May 2020

In the final entry of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing gives his opinion on the overall security of 5G networks. The reason that most mobile networks are attacked is because there is inherent value for the attacker in doing so. 5G networks offer connected healthcare devices, hospital records, autonomous vehicles, flood management sensors, banking transactions and more. Will this data be secure on the 5G network?

Read more >

5G Security Blog Series (Part 2):  The Engineer’s Perspective

19th May 2020

In part 2 of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. This week he gives us his insights on an engineer's perspective and the pressures they face when deploying networks.

Read more >

Reports

Securing the Path from 4G to 5G: How to protect mobile networks and subscribers during migration

Download the whitepaper >

Simjacker Technical Paper

Download the report >

A New Dawn in Security: Who is Responsible for the Protection of a Nation’s Critical Communications Infrastructure?

Download the whitepaper >

5G - The Security of Things to Come

Download the report >

Visualisations

5G Networks - How to Secure the Future

View Webinar >

COVID-19 SMS Spam Dashboard

View Dashboard >

Securing National Critical Infrastructure Infographic

View Infographic >

Simjacker

Watch video >