The next free conference of the Risk & Assurance Group (RAG) will be held at MTN’s offices in Johannesburg on Monday 4th and Tuesday 5th September.
Personal data is used to launch cyber attacks against us. Instead of just playing defense, we can take the fight to the criminals.
Common sense tells us it is wasteful to own things but not know where they are, or how they are being used.
A former criminal says that bypass frauds persist because there is so much corruption within telcos, governments, and even anti-fraud solution providers.
Google lowers its costs by advocating for laws that prevent telcos from invoicing Google. Meanwhile, academics are failing to state how much money they receive from Google.
Recruitment might be helped by making RA job specifications sound more exciting, but what really matters is giving people with the right personality the chance to show what they can do.
Nice Systems insecurely configured an Amazon cloud server used to hold data about calls made to Verizon’s contact center.
SS7 has security issues, but perhaps they have been over-publicized.
Shankar Palaniandy of FRS Labs talks about the Indian national ID database and its impact on customer verification and services.
One of the people arrested blamed engineers at MTN headquarters for taking advantage of weak IT security.