Protecting assets against threat actors targeting telecoms

For telecom boardrooms, the protection of assets against threat actors is a high-stakes battle for operational resilience and brand trust. While multi-million dollar security stacks are designed to keep external adversaries at bay, 2025 data sugge…

Cloudflare outage highlights enterprise infrastructure dependence

The latest Cloudflare outage shows that a dangerously low number of infrastructure providers are depended on for enterprise services. The disruption forces a difficult conversation for leaders: efficiency has been prioritised over structural integrity,…

How fragmented regulation stifles mobile security innovation

Fragmented security regulation costs mobile operators billions, diverting resources from threat mitigation toward administrative compliance. For security execs in the telecoms sector, the remit has expanded well beyond securing network perimeters. A ne…

Chinese hacking group ‘Phantom Taurus’ targets governments

Cybersecurity researchers have identified a previously undocumented state-sponsored Chinese hacking group dubbed Phantom Taurus. A new report from Palo Alto Networks’ Unit 42 threat intelligence team details a multi-year investigation into Phantom Taur…

BritCard: The real obstacle for UK digital ID is a national trust deficit

We’ve been hearing whispers about a national digital ID from the UK Government for years, and now it has a name: ‘BritCard’.  On the surface, the pitch sounds tempting: a simple way to access services, prove who you are, and make…