As a centre of excellence in mobile security, the AdaptiveMobile Security Threat Intelligence Unit utilises the global deployments of AdaptiveMobile's Network Protection Platform (NPP), present in over 80 operators, and provides state-of-the-art protection through the correlation and analysis of over 40 billion dark data events every day.
19th Oct 2020
It seems like yesterday that we were talking about 4G technology but today is all about 5G and the new challenges and threats that the deployment of this technology will bring. Based on our deep expertise of the threat landscape, here is a projection of the top 5G network security issues that we may face in 2028.
5th Oct 2020
With 5G roaming on the horizon, now is a good time to reflect on the categories of risk that network operators may face in the future for 5G interconnection traffic.
19th Aug 2020
As an industry, mobile services providers, suppliers and the GSMA have worked together to create a framework of recommendations covering the various network protocols involved in mobile network internetworking. From GSM MAP and CAMEL using SS7, LTE/IMS using DIAMETER, SIP/ISUP for VOICE and GTP-C for mobile data services. Corresponding interconnection security recommendations such as FS.11 (SS7 Interconnect Security Monitoring and Firewall Guideline) and FS.19 (Diameter Interconnect Security) have provided a basis for navigating the task of securing mobile networks effectively. It is clear that whilst these defences when implemented with an active firewall have been effective at significantly enhancing network security, attackers have not been deterred. In particular well organized and well-funded nation state intelligence and privately operated organizations have continued to attack networks with increasing sophistication and deception
7th Aug 2020
Recently in Ireland, a number of people have been targeted by fraudsters sending phishing SMSs , with the result that they have lost money. We profile how this has happened and what can be done
29th Jul 2020
There are a number of well-established security tools for defending and protecting networks. Many of the concepts were originally developed for the enterprise network environment and are finding use in mobile carriers. Just to clarify, when I say mobile carriers’ environment, I do not mean the enterprise systems and internal connectivity and services. I mean the subscriber service network of Radio, Core Packet, Intelligent Network and Service Platforms.
9th Jul 2020
Declaring any technology as 100% secure is a very dangerous statement to make, especially when the security in question is protecting something of value. Value attracts attackers, hackers and fraudsters like nothing else.
26th May 2020
In the final entry of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing gives his opinion on the overall security of 5G networks. The reason that most mobile networks are attacked is because there is inherent value for the attacker in doing so. 5G networks offer connected healthcare devices, hospital records, autonomous vehicles, flood management sensors, banking transactions and more. Will this data be secure on the 5G network?
19th May 2020
In part 2 of our 3 part 5G Security Blog Series, Graeme Coffey, Head of Marketing shares his in-depth telecoms industry experience and opinion of the opportunities and challenges ahead for securing 5G networks. This week he gives us his insights on an engineer's perspective and the pressures they face when deploying networks.