By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
By using this web site you accept our use of cookies. More information about cookies
Accept
Infopulse - Expert Software Engineering, Infrastructure Management Services
Infopulse - Expert Software Engineering, Infrastructure Management Services
reCAPTCHA
Send message Please fill in this quick form and we will send you a free quote shortly.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our updates Be among the first to get exclusive content on IT insights, innovations, and best practices.
* Required fields
Your privacy is important to us. We will never share your data.
Subscribe to our New career opportunities Please fill in this quick form to be among the first to receive our updates.
* Required fields
Your privacy is important to us. We will never share your data.
reCAPTCHA
* Required fields
Your privacy is important to us. We will never share your data.
Default avatar Send an email to person Please fill in this quick form to contact our expert directly.
* Required fields
Your privacy is important to us. We will never share your data.
Read the Full Case Study Don't miss the most interesting part of the story!
Submit this quick form to see the rest and to freely access all case studies on our website.
* Required fields
Your privacy is important to us. We will never share your data.
Infopulse - Expert Software Engineering, Infrastructure Management Services

Telecom

September 24, 2020  |  Cybersecurity  |  Infopulse
DDoS and DNS Attacks: Common Security Questions Answered for Businesses

With increased reliance on digital channels due to the pandemic, a lot of companies had to rapidly re-think their cybersecurity practices or even assemble new defense structures from the bottom-up. Learn how to protect your business against common types of DDoS/DNS attacks from our article!

Read more
July 17, 2020  |  Blockchain  |  Jan Keil
Self-Sovereign Identity: Use Cases, Level of Maturity, and Adoption

The concept of self-sovereign identity (SSI) has been gaining significant traction since the mid-2010s. Private-by-design, immutable, and fully secure, self-sovereign identity solutions promised to “‘place the digital ID back into the user's wallet' and reduce the compliance and data storage burden for businesses.

Read more
June 25, 2020  |  Telecom  |  Ievgenii Kachalka
SMS Fraud Cases and Recommended Measures to Prevent Them

This is the third post from A Definitive Guide to Telecom Security, aimed at providing an extensive overview of possible security issues. Following the publication on voice fraud, this article highlights the most common messaging fraud cases and countermeasures to prevent them.

Read more
June 10, 2020  |  Telecom  |  Andrii Ivanov
Combating Voice Fraud: Best Practices from a Telecom Expert

Last year, the total losses experienced due to voice fraud constituted $28 billion with International Revenue Interconnect Bypass and Traffic Pumping leading the way as top offenders. So how do you fight back? By understanding how the common voice scams are engineered and implementing advanced detection mechanisms for identifying those early signs of fraud en masse....

Read more
1 2 3 4