Articles

Home/Tag:Articles
2018-09

Someone may be listening… – Two TV documentaries from RTS (Switzerland) and CBC (Canada)

By |2022-10-26T18:27:31+02:00September 28th, 2018|All posts, Kudelski, Security|Comments Off on Someone may be listening… – Two TV documentaries from RTS (Switzerland) and CBC (Canada)

Two documentaries, from RTS - Swiss Television (in French) and CBC RADIO-CANADA (in English) illustrate how a hacker is able to listen into someone's mobile conversations, read [...]

2018-01

Visiting the heart of Kudelski Cybersecurity labs in Cheseaux-sur-Lausanne (Le Temps)

By |2022-12-20T13:00:51+01:00January 18th, 2018|All posts, Kudelski, Security|Comments Off on Visiting the heart of Kudelski Cybersecurity labs in Cheseaux-sur-Lausanne (Le Temps)

An article published by Le Temps on December 22nd, 2017 highlights how Kudelski Security is emproving security levels on connected objects, from cars to elevators and many other. [...]

2017-11

Kudelski Group launches White Noise to secure mobile phone communications

By |2022-12-20T13:00:42+01:00November 20th, 2017|All posts, Kudelski, Security|Comments Off on Kudelski Group launches White Noise to secure mobile phone communications

The Kudelski Group (SIX:KUD.S), the world leader in digital security, today announced the launch of WHITE NOISE, a secure mobile communication solution for businesses and government institutions. [...]

2017-02

Just How Secure Are Those Encrypted Apps…

By |2019-01-15T18:24:09+01:00February 28th, 2017|All posts, Kudelski, Security|Comments Off on Just How Secure Are Those Encrypted Apps…

An article published in Forbes magazine on Feb. 28th 2017, highlights the flaws in encrypted apps such as Signal, Whatsapp or Telegram. Thanks to its expertise, Kudelski Security [...]

2015-05

How to intercept mobile communications easily…

By |2019-01-15T18:24:13+01:00May 11th, 2015|All posts, Kudelski, Security|Comments Off on How to intercept mobile communications easily…

An article published by International Institute of Cyber Security on May 11th 2015 describes how easy it can be to intercept mobile communications (calls and messages). If [...]

2015-04

Using private devices for work, yes but…

By |2022-10-05T09:51:29+02:00April 1st, 2015|All posts, Atem, Consulting, Costs, Security, Visibility, Workload|Comments Off on Using private devices for work, yes but…

Before authorizing employees to use their private devices for business purposes, a company should answer several questions related to the financial, security and legal aspects. This article [...]

2009-10

Reduce costs by reducing the waste

By |2022-10-05T09:52:15+02:00October 1st, 2009|All posts, Atem, Consulting, Costs, Tspendo, Visibility, Workload|Comments Off on Reduce costs by reducing the waste

This article explains how the TLM (Telecom Lifecycle Management) best practices can help the various actors of the process in order to better control what you [...]

2008-12

Reducing telecom costs by 10 to 30% thanks to TEM

By |2022-10-05T09:52:22+02:00December 1st, 2008|All posts, Atem, Consulting, Costs, Tspendo, Visibility, Workload|Comments Off on Reducing telecom costs by 10 to 30% thanks to TEM

This article presents a table summarizing the actions that can be done at each step of the Telecom Lifecycle to reduce the cost & workload. It [...]

2008-08

Transparent Telecom costs

By |2022-10-05T09:52:32+02:00August 1st, 2008|All posts, Atem, Consulting, Costs, Visibility, Workload|Comments Off on Transparent Telecom costs

This article presents the general principe of TEM applications, analyses all steps of the management process (Telecom Lifecycle) and describes the features & benefits that a [...]

2008-07

Telecom Environment Management (TEM)

By |2022-10-05T09:52:39+02:00July 1st, 2008|All posts, Atem, Consulting, Costs, Visibility, Workload|Comments Off on Telecom Environment Management (TEM)

This article is a general introduction to the TEM topic and answers some basic questions such as: How does it work ?, How does it look [...]

Go to Top