How 5G FWA Will Blur Lines Between Fixed And Mobile Operators

Published on March 31st, 2019 | by Kevin McTiernan

As telecom operators plan their rollout of the fifth generation (5G) of network services, two distinct services have emerged, mobile and fixed wireless access (or FWA). These services are being launched on separate timelines and are... Read More


Are you Ready for 5G Lawful Interception?

Published on March 19th, 2019 | by Joel Roy

5G Brings on new challenges for regulatory compliance. SS8 is leading in 5G Lawful Interception (LI) mediation, with the 1st 5G deployment in production. We are working with our customers who are amongst the largest and most... Read More

Cyber Security

Can You Prevent Becoming The Next Equifax?

Published on September 27th, 2018 | by Vatsal Desai

A security incident is particularly concerning when it is associated with platforms that process data for an enormous number of users. Lost PII and/or financial data due to such incidents may be used for identity theft... Read More

Cyber Security

Does Banning USB Drives Really Stop Data Loss?

Published on August 1st, 2018 | by Kevin McTiernan

In May of this year, IBM Announced to employees that they would be “prohibiting data transfer to all portable storage devices.” This was a practice in certain parts of IBM that was extended company-wide. The reasons... Read More

Cyber Security

Hackers Compromise US Utility Control Room

Published on July 26th, 2018 | by Kevin McTiernan

The WSJ reported Monday that hackers working for Russia had gained access to the control rooms of US utility companies last year. Today, power utilities are part of the critical national infrastructure – the glue holding... Read More

Back to Top ↑