• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 2 Jun 2023 | Commsrisk Top Ten for May 2023
  • 1 Jun 2023 | Robocalls and Call Authentication: Commsrisk Show Episode 12
  • 31 May 2023 | Will the Big New US Robocall Lawsuit Change Anything?
  • 30 May 2023 | ENISA Publishes 5G Security Controls Matrix
  • 29 May 2023 | Arguments in Brazil about STIR/SHAKEN
  • 26 May 2023 | Will AI-Powered Spam Filters Be Forced on Indian Telcos?
  • 25 May 2023 | Nation State Hacking, Pre-Installed Malware, Prison for Spoofer and Job Cuts: Commsrisk Show Episode 11
  • 24 May 2023 | Free Guide for Telco KYC
  • 23 May 2023 | French President Macron Promises National Scam Block for SMS and Email
  • 22 May 2023 | 13 Years in Prison for Head of London Phone Spoofing Fraud Outfit
> 2012

Measurement and the Eureka Moment

By Eric Priezkalns 31 Dec 2012 Data & Analytics

As we reach the end of the year, my thoughts turn to the passage of time, and its measurement. Do any of us know how…


Telstra Overcharged Roaming Customers Since 2006

By Eric Priezkalns 27 Dec 2012 Assurance & Audit

Australian operator Telstra has started to issue refunds after the discovery that its outbound mobile roamers have been overcharged for data services since 2006. The…


The talkRA Review of 2012

By Eric Priezkalns 23 Dec 2012 General

Once again, it is the time to wish you well and to remember the big news stories of the year. So without further ado… January…


When Did Voice Leakage End?

By Eric Priezkalns 17 Dec 2012 Assurance & Audit

Here is a pop quiz. Who said the following, and when did they say it? “Leakage on voice services, by far the greatest revenue generator,…


Core Risks for Telcos

By Eric Priezkalns 10 Dec 2012 Risk, Fraud & Security

Dan Baker recently asked a good question about telecoms risk management: Thanks for this [explanation of Enterprise Risk Management by Professor Stuart Greenbaum]. It’s a…


Embracing Wrong with Kathryn Schulz

By Eric Priezkalns 6 Dec 2012 Risk, Fraud & Security

Have you ever seen a business that made a mistake? Duh. Of course. I work in RA/fraud/risk etc. I deal with the consequences of mistakes…


Analytics is not the Silver Bullet

By Moinak Banerjee 3 Dec 2012 Data & Analytics

One may think, that the above is obvious- but it definitely is not. As the saying goes “Ignorance is bliss”, and so a lot of…


From Ensemble to Horizontal – what makes RA special

By Eric Priezkalns 26 Nov 2012 Assurance & Audit

It is good to be back in Britain. After three years away, I have busily reacquainted myself with what Britain does best: bangers ‘n’ mash,…


Subex Sells RA ROC to Thai Operator

By Eric Priezkalns 24 Nov 2012 Assurance & Audit

Subex, the Indian RA vendor, has announced the sale of its revenue assurance ROC software to True Corporation, a multiplay provider in Thailand. You can…


WeDo Continues Retail Expansion Strategy

By Eric Priezkalns 23 Nov 2012 Assurance & Audit

WeDo, the Portuguese business assurance vendor, has long aimed to generate superior revenues from outside of the communications sector. Now they intend to accelerate sales…


1 2 3 … 11 »

Replay Our Discussion Show from May 31

Our weekly Wednesday livestreams feature Commsrisk Editor Eric Priezkalns and his co-presenters engaging in conversation with risk experts from around the communications industry. Catch recordings of all past episodes at tv.commsrisk.com.
Our most recent episode tackled the thorny issue of nuisance robocalls and call authentication from several different perspectives. The guests were robocall researcher Sathik Prasad, network engineering veteran Pierce Gorman and Feng Hao, Professor of Security Engineering at Warwick University.

Latest Stories on Commsrisk

Commsrisk Top Ten for May 2023


Robocalls and Call Authentication: Commsrisk Show Episode 12


Will the Big New US Robocall Lawsuit Change Anything?


ENISA Publishes 5G Security Controls Matrix



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (110)
    • ►June (2)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
Recent Posts
  • Commsrisk Top Ten for May 2023
  • Robocalls and Call Authentication: Commsrisk Show Episode 12
  • Will the Big New US Robocall Lawsuit Change Anything?
  • ENISA Publishes 5G Security Controls Matrix
  • Arguments in Brazil about STIR/SHAKEN
  • Will AI-Powered Spam Filters Be Forced on Indian Telcos?
  • Nation State Hacking, Pre-Installed Malware, Prison for Spoofer and Job Cuts: Commsrisk Show Episode 11
  • Free Guide for Telco KYC
  • French President Macron Promises National Scam Block for SMS and Email
  • 13 Years in Prison for Head of London Phone Spoofing Fraud Outfit
  • Artificially Inflated Traffic from Bots Makes Spotify Remove Thousands of AI-Generated Songs
  • Karsten Nohl on Cloud Hacking, Central Bank Ends SMS 2FA and Macron’s Filter: Commsrisk Show Episode 10
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT