• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 26 Jan 2023 | FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • 25 Jan 2023 | Ericsson Allocates $220mn for More Corruption Penalties
  • 24 Jan 2023 | 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • 23 Jan 2023 | How Bad Was the New T-Mobile API Data Breach?
  • 20 Jan 2023 | Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • 19 Jan 2023 | Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • 18 Jan 2023 | Scattered Spider: New Cyber Attack Targets Telcos
  • 17 Jan 2023 | Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 16 Jan 2023 | 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
  • 13 Jan 2023 | Thai Police Cut Internet Cables Used by Cambodian Scammers
> Deutsche Telekom

The Unsung Heroes of 2021

By Eric Priezkalns 24 Dec 2021 General

Managing risk and contributing to our professional community can sometimes feel like thankless tasks. Here is some small thanks for eight of my heroes of the year.


Deutsche Telekom Chief Security Officer Tells Security Teams To Be More Entrepreneurial

By Eric Priezkalns 29 Sep 2021 Risk, Fraud & Security

Thomas Tschersich believes the key to realizing security by design is to turn security functions from cost centers into sources of value.


RAG TV: Deutsche Telekom’s Business Assurance Journey and Using Blockchain to Fight Wangiri

By Eric Priezkalns 9 Apr 2020 Assurance & Audit

Gina Pesheva talks about changing the role of RA teams and Tony Sani explains why he lets telcos use his blockchain for free.


This Deutsche Telekom Video Explains Business Assurance in Just Four Minutes

By Eric Priezkalns 3 Feb 2020 Assurance & Audit

This fun four-minute video explains the need for business assurance in a way that everybody can understand.


5 Collaborative Projects Announced at RAG Bonn

By Eric Priezkalns 19 Jun 2019 Education & Conferences

Last week’s Risk & Assurance Group (RAG) conference saw the launch or upgrade of work on wangiri, online training, leakage coverage, modeling software, and a preview of RAG TV.


TEOCO Buys QoE Data Experts CIQUAL

By Eric Priezkalns 7 Jun 2019 Data & Analytics

Atul Jain, CEO of TEOCO, believes telcos need to understand the user’s perspective in order to make better business decisions.


Awards for Deutsche Telekom Business Assurance

By Rob Chapman 4 Jun 2019 Assurance & Audit

DT won the TM Forum catalyst award in three distinct categories. This shows how business assurance is progressing under the leadership of DT’s Gina Pesheva.


Africa and India to Complete Global Cycle of Risk and Assurance Conferences

By Eric Priezkalns 20 May 2019 Education & Conferences

Johannesburg (October 1-2) and Delhi (February 5-6) join Bonn and Toronto in the global schedule of free RAG conferences.


32 Months of Prison for Hacker Who Knocked Liberia Offline

By Eric Priezkalns 14 Jan 2019 Risk, Fraud & Security

Daniel Kaye launched massive DDoS attacks at Liberian network Lonestar after being hired by rival telco Cellcom.


Bonn Voyage: Meeting the Best at Deutsche Telekom

By Rob Chapman 21 Apr 2017 Education & Conferences

Deutsche Telekom will host this June’s RAG Bonn conference, which already has a strong agenda covering fraud, revenue assurance, credit risk, ERM, security, and more.


1 2 »

Latest Stories on Commsrisk

FCC Threatens to Disconnect Twilio for Illegal Robocalls


Ericsson Allocates $220mn for More Corruption Penalties


73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules


How Bad Was the New T-Mobile API Data Breach?



Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement


Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam


Scattered Spider: New Cyber Attack Targets Telcos


Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?



4 Ways Blockchains Will Help Communications Providers to Manage Their Risks


Thai Police Cut Internet Cables Used by Cambodian Scammers


Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS


Surprise UK Government Announcement Says Sharing Netflix Passwords Is a Crime



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (19)
    • ►January (19)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Mike Willett
    Mike Willett
Recent Posts
  • FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • Ericsson Allocates $220mn for More Corruption Penalties
  • 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • How Bad Was the New T-Mobile API Data Breach?
  • Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • Scattered Spider: New Cyber Attack Targets Telcos
  • Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
  • Thai Police Cut Internet Cables Used by Cambodian Scammers
  • Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS
  • Surprise UK Government Announcement Says Sharing Netflix Passwords Is a Crime
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT