Perhaps eight African countries will adopt national revenue, tax and anti-simbox audits like those imposed on Ghanian telcos.
According to EY, 2016 is going to be a complicated and challenging year for cybersecurity and risk management.
This deal shows the importance of mining data in places that were previously inaccessible, such as audio recordings.
The NetScreen line of firewalls had been compromised by unauthorized code, and was subject to a weakness relating to the random numbers used for encryption.
You should apply professional skepticism, but it is worth reading this succinct report on estimated leakages and trends in risk management.
A few simple equations will help us to understand why some people leave nasty comments on the internet, and what can be done to discourage them.
If we want to do a better job of tackling fraud and other risks, we must be more open with others. Discussing the problems we all face is essential to finding new solutions.
Apple’s strategy is to skip any middlemen between them and their customers, and that includes mobile network operators. How can the telcos compete with Apple’s might?
If you do not want to read this article because you think intellectual property rights are not relevant to your job, then you should, because they are.
Which were the most popular articles during 2015? This rundown will help you to catch up with the posts that your fellow professionals were reading.