Our Latest Posts

In a previous post, voice over LTE’s deployment by mobile operators to compete with voice over IP has been discussed. That post covered some precautionary steps to follow for an “unrisky” deployment process. A couple of ideas are to add and might be useful to consider while performing an optimized deployment. The 3GPP (3rd Generation…

A survey based on a panel of risk-managers by Allianz in January 2015 revealed that, fortunately, cyber risk was one of their five major concerns. In the light of this very kind of studies, twenty of major international insurance companies started, a few years ago, to focus on insuring against cyber risk, after covering for…

Which CIO or CISO has not been, at least once, confronted to the pressuring desire of a VIP or a group of young contributors to use their personal apps in the workplace or on their professional mobility tools? During  CyberSecurity International Forum  (FIC 2015) held in Lille last January, Pradeo Security Systems’ founding president Clément…

Who have not, these days, experienced a failing or interrupted call while using their smartphone? It’s a fact tending to become widespread. The reason why is the significant increase in data sharing, by mobile devices and the CSFB (Circuit Switch FallBack) technology which automatically moves voice calls processing from mobile carriers’ 4G network to 2G…

We have become the mobile actors of a connected world, where objects are more and more ubiquitous in our daily life. From the moment we wake up until bedtime we browse and share, in a personal or professional way, most of the time in a permanent tangle of devices set up in BYOD (Bring Your…