• Home
  • About
  • Contact
  • Advertising
  • Menu Item
  • Menu Item
Commsrisk
  • Risk, Fraud & Security
  • Assurance & Audit
  • Spam
  • Cold War 2
  • Data & Analytics
  • Privacy & IP
  • Digital Money
  • Education
  • The Commsrisk Show
Latest
  • 27 Jan 2023 | Engineer Arrested for Wiretapping Opponents of Former Mexico City Mayor
  • 26 Jan 2023 | FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • 25 Jan 2023 | Ericsson Allocates $220mn for More Corruption Penalties
  • 24 Jan 2023 | 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • 23 Jan 2023 | How Bad Was the New T-Mobile API Data Breach?
  • 20 Jan 2023 | Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • 19 Jan 2023 | Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • 18 Jan 2023 | Scattered Spider: New Cyber Attack Targets Telcos
  • 17 Jan 2023 | Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 16 Jan 2023 | 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
> RAG TV

The Complete TV Mini Series of the RAG-Subex Survey

By Eric Priezkalns 13 Apr 2022 Data & Analytics

Four different experts from Subex gave RAG TV their interpretations of the RAG-Subex survey of revenue assurance, fraud management and cyber security professionals.


Why RAG Conferences Will Not Be Televised

By Eric Priezkalns 7 Feb 2022 Education & Conferences

Video networking cannot replicate in-person conferences. The Risk & Assurance Group will maintain two distinct forms of engagement: physical meetings like RAG Dubai and new seasons of RAG TV.


RAG TV Season 3 Finale Hints at More to Come

By Matthew Carter 6 May 2021 Education & Conferences

The longest and most successful season of RAG TV closed with a wide-ranging debate about the most important risk priorities for comms providers.


RAG TV: The Scale of A2P SMS Bypass Fraud

By Eric Priezkalns 2 Apr 2021 Risk, Fraud & Security

Emmy Léger of Araxxe explained how they identified an SMS aggregator that uses gray routes for 98% messages and why A2P SMS bypass is so widespread.


Should Other Countries Copy the US Approach to Fraud and Spoofing?

By Eric Priezkalns 25 Mar 2021 Risk, Fraud & Security

Prof. Eric Burger, former White House and FCC advisor, told RAG TV about the US strategy for tackling telecoms fraud.


Over 10,000 Views for RAG TV’s Weekly Interview Show

By Eric Priezkalns 26 Feb 2021 Education & Conferences

Moly McMillan spun the stories as we talked about revenue assurance in cable companies, mobile operators and OTT providers for episode 8 of the current season.


Why Telecoms Fraud Is Like a Virus

By Eric Priezkalns 18 Feb 2021 Risk, Fraud & Security

Forensic investigator, lawyer and cybercrime expert Jacqueline Fick was the guest for Episode 7 of the current season of RAG TV.


RAG TV: Telcos, Planes and Autonomization

By Eric Priezkalns 5 Feb 2021 Education & Conferences

Bartek Bukowski of BT was the expert guest for Episode 5 of the current season of RAG TV. Root cause analysis was the nominal subject of the show, but we talked about much, much more.


Leadership for Africans (and Everyone Else)

By Eric Priezkalns 21 Jan 2021 Education & Conferences

Some thoughts about the difference between being more advanced and being a leader.


Data, Debt and Appreciating Loyal Customers

By Eric Priezkalns 14 Jan 2021 Data & Analytics

If you knew people who had enhanced profits by helping loyal customers to switch to the best tariff, would you not want to share their advice with the largest possible audience?


1 2 3 4 »

Latest Stories on Commsrisk

Engineer Arrested for Wiretapping Opponents of Former Mexico City Mayor


FCC Threatens to Disconnect Twilio for Illegal Robocalls


Ericsson Allocates $220mn for More Corruption Penalties


73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules



How Bad Was the New T-Mobile API Data Breach?


Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement


Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam


Scattered Spider: New Cyber Attack Targets Telcos



Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?


4 Ways Blockchains Will Help Communications Providers to Manage Their Risks


Thai Police Cut Internet Cables Used by Cambodian Scammers


Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS



Commsrisk on Twitter

Tweets from @commsrisk

Receive Weekly Newsletters by Email

Email address:


First Name:


Last Name:


Archives
  • ►2023 (20)
    • ►January (20)
  • ►2022 (260)
    • ►December (22)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (22)
    • ►April (21)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2021 (262)
    • ►December (23)
    • ►November (22)
    • ►October (21)
    • ►September (22)
    • ►August (22)
    • ►July (22)
    • ►June (23)
    • ►May (21)
    • ►April (22)
    • ►March (23)
    • ►February (20)
    • ►January (21)
  • ►2020 (262)
    • ►December (23)
    • ►November (21)
    • ►October (22)
    • ►September (22)
    • ►August (21)
    • ►July (23)
    • ►June (22)
    • ►May (21)
    • ►April (22)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2019 (261)
    • ►December (22)
    • ►November (21)
    • ►October (23)
    • ►September (21)
    • ►August (22)
    • ►July (23)
    • ►June (20)
    • ►May (23)
    • ►April (22)
    • ►March (21)
    • ►February (20)
    • ►January (23)
  • ►2018 (261)
    • ►December (21)
    • ►November (22)
    • ►October (23)
    • ►September (20)
    • ►August (23)
    • ►July (22)
    • ►June (21)
    • ►May (23)
    • ►April (21)
    • ►March (22)
    • ►February (20)
    • ►January (23)
  • ►2017 (260)
    • ►December (21)
    • ►November (22)
    • ►October (22)
    • ►September (21)
    • ►August (23)
    • ►July (21)
    • ►June (22)
    • ►May (23)
    • ►April (20)
    • ►March (23)
    • ►February (20)
    • ►January (22)
  • ►2016 (271)
    • ►December (22)
    • ►November (22)
    • ►October (22)
    • ►September (24)
    • ►August (24)
    • ►July (21)
    • ►June (24)
    • ►May (23)
    • ►April (21)
    • ►March (25)
    • ►February (22)
    • ►January (21)
  • ►2015 (240)
    • ►December (23)
    • ►November (25)
    • ►October (22)
    • ►September (22)
    • ►August (22)
    • ►July (23)
    • ►June (22)
    • ►May (22)
    • ►April (22)
    • ►March (25)
    • ►February (7)
    • ►January (5)
  • ►2014 (87)
    • ►December (10)
    • ►November (8)
    • ►October (8)
    • ►September (5)
    • ►August (5)
    • ►July (5)
    • ►June (7)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (7)
    • ►January (9)
  • ►2013 (100)
    • ►December (9)
    • ►November (8)
    • ►October (5)
    • ►September (10)
    • ►August (8)
    • ►July (12)
    • ►June (10)
    • ►May (8)
    • ►April (7)
    • ►March (8)
    • ►February (8)
    • ►January (7)
  • ►2012 (108)
    • ►December (7)
    • ►November (10)
    • ►October (7)
    • ►September (9)
    • ►August (8)
    • ►July (9)
    • ►June (10)
    • ►May (10)
    • ►April (13)
    • ►March (11)
    • ►February (9)
    • ►January (5)
  • ►2011 (132)
    • ►December (7)
    • ►November (12)
    • ►October (10)
    • ►September (11)
    • ►August (18)
    • ►July (12)
    • ►June (11)
    • ►May (12)
    • ►April (12)
    • ►March (12)
    • ►February (7)
    • ►January (8)
  • ►2010 (95)
    • ►December (6)
    • ►November (7)
    • ►October (5)
    • ►September (5)
    • ►August (5)
    • ►July (9)
    • ►June (5)
    • ►May (16)
    • ►April (11)
    • ►March (11)
    • ►February (8)
    • ►January (7)
  • ►2009 (86)
    • ►December (5)
    • ►November (6)
    • ►October (8)
    • ►September (7)
    • ►August (8)
    • ►July (6)
    • ►June (6)
    • ►May (8)
    • ►April (11)
    • ►March (7)
    • ►February (6)
    • ►January (8)
  • ►2008 (168)
    • ►December (11)
    • ►November (13)
    • ►October (22)
    • ►September (22)
    • ►August (20)
    • ►July (13)
    • ►June (12)
    • ►May (11)
    • ►April (12)
    • ►March (9)
    • ►February (11)
    • ►January (12)
  • ►2007 (144)
    • ►December (11)
    • ►November (9)
    • ►October (16)
    • ►September (14)
    • ►August (16)
    • ►July (16)
    • ►June (10)
    • ►May (10)
    • ►April (9)
    • ►March (12)
    • ►February (11)
    • ►January (10)
  • ►2006 (38)
    • ►December (16)
    • ►November (17)
    • ►October (5)
Editor
  • Eric Priezkalns
    Eric Priezkalns
Leading Contributors
  • Joseph Nderitu
    Joseph Nderitu
  • Michael Lazarou
    Michael Lazarou
  • David Morrow
    David Morrow
  • Marianne Curphey
    Marianne Curphey
  • Lee Scargall
    Lee Scargall
  • Dan Baker
    Dan Baker
Recent Posts
  • Engineer Arrested for Wiretapping Opponents of Former Mexico City Mayor
  • FCC Threatens to Disconnect Twilio for Illegal Robocalls
  • Ericsson Allocates $220mn for More Corruption Penalties
  • 73% of IoT Device Manufacturers Do Not Comply with Imminent UK Security Rules
  • How Bad Was the New T-Mobile API Data Breach?
  • Why an Argument about Antisemitism May Prompt Change in Data Protection Enforcement
  • Euro Police Shut Down Four Call Centers Selling Cryptocurrency Investment Scam
  • Scattered Spider: New Cyber Attack Targets Telcos
  • Will the US Government Finally Turn Against NSA Warrantless Comms Surveillance?
  • 4 Ways Blockchains Will Help Communications Providers to Manage Their Risks
  • Thai Police Cut Internet Cables Used by Cambodian Scammers
  • Elon Musk Says Twitter Lost $60mn a Year Because 390 Telcos Used Bot Accounts to Pump A2P SMS
  • Home
  • About
  • Contact
  • Advertising

Articles copyright © the author, all else copyright © Revenue Protect Limited

We use cookies to remember repeat visits to this website. Click “accept” to give consent or "settings" to avoid non-essential cookies.
.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT