• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 26 Jan 2023 | FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • 25 Jan 2023 | Ericsson Allocates $220mn for More Corruption Penalties
  • 24 Jan 2023 | 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • 23 Jan 2023 | How Bad Was the New T-Mobile API Data Breach?
  • 20 Jan 2023 | Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • 19 Jan 2023 | Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • 18 Jan 2023 | Scattered Spider: New Cyber Attack Targets Telcos
  • 17 Jan 2023 | Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 16 Jan 2023 | 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
  • 13 Jan 2023 | Thai Police Cut Internet Cables Used by Cambodian Scammers
> network virtualization

Could Telcos Securely Run Their Networks in Public Clouds?

By Eric Priezkalns 3 Apr 2019 Risk, Fraud & Security

ETSI standard TS 103 457 could be used to limit access to sensitive network functions running on public clouds.


Legacy Assurance Systems Won’t Hold up for 5G

By Joe Villarreal 24 May 2018 Assurance & Audit

Monetizing 5G means adopting new kinds of assurance to address an exponential rise in risk.


Digital Services: The Risks of Crossing the Chasm

By Carlos Marques 13 Dec 2016 Data & Analytics

As telcos transform into digital service providers they will increasingly rely on analytics to manage new risks.


Seeing Daylight: How to Integrate Multi-Vendor SDN/NFV

By Dan Baker 15 Jul 2016 Data & Analytics

Marcin Paszkiewicz and Bartosz Michalik of Amartus discuss OpenDaylight and other standards for virtualized networks.


Did You Forget Something? Assuring Revenue in an NFV/SDN Environment

By Carlos Marques 21 Apr 2016 Assurance & Audit

If you thought RA was already a difficult job, network virtualization is going to make it a lot more complex.


Latest Stories on Commsrisk

FCC Threatens to Disconnect Twilio for Illegal Robocalls


Ericsson Allocates $220mn for More Corruption Penalties


73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules


How Bad Was the New T-Mobile API Data Breach?



Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement


Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam


Scattered Spider: New Cyber Attack Targets Telcos


Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?



4 Ways Blockchains Will Help Communications Providers to Manage Their Risks


Thai Police Cut Internet Cables Used by Cambodian Scammers


Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS


Surprise UK Government Announcement Says Sharing Netflix Passwords Is a Crime



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (19)
    • ►January (19)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Dan Baker
    Dan Baker
Recent Posts
  • FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • Ericsson Allocates $220mn for More Corruption Penalties
  • 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • How Bad Was the New T-Mobile API Data Breach?
  • Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • Scattered Spider: New Cyber Attack Targets Telcos
  • Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
  • Thai Police Cut Internet Cables Used by Cambodian Scammers
  • Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS
  • Surprise UK Government Announcement Says Sharing Netflix Passwords Is a Crime
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT