The BT Leakage Susceptibility Model is currently undergoing evaluation by members of the Risk & Assurance Group.
The first part of this two-part series summarizes how Ericsson came to be accused of paying bribes in 18 different countries.
On Thursday, I argued fear should be used to motivate increased investment in all kinds of risk and assurance. On Friday, WannaCry illustrated why.
Global telecoms fraud is such a big business that it is worth more than the GDP of some countries.
We can collect and share data to identify fraudsters but the same data can be used by fraudsters to target us.
There are many apps on Google Play that claim to let Android users send messages which seem to come from somebody else.
The suspect is alleged to have transferred money from MTN’s bank to her personal account over a two-year period.
Serious but underfunded professionals know that downloading a draft standard for review also means getting a valuable useful document for free.
Ramon Batista admitted that his telco had cloned mobile phones and used the compromised accounts to make international calls, resulting in losses of almost USD800,000 for Sprint and Verizon.
The authors from Detecon have added workflow diagrams which improve their guide to telco enterprise risk management.