The West Africa Threat Landscape: What Changed in 2025 and What to Expect Next
Fintech fraud, BEC campaigns targeting logistics platforms, and SS7-based telecoms attacks are reshaping how African enterprises approach security.
9 min readInsights from the team building PulseADT and the Glemad Research lab. No marketing content. Real analysis.
How PulseADT builds a causal model of an attack - not a pile of alerts - and why that changes what autonomous response is possible.
Fintech fraud, BEC campaigns targeting logistics platforms, and SS7-based telecoms attacks are reshaping how African enterprises approach security.
9 min readNITDA enforcement is intensifying. Here is what has changed, what is still unclear, and how automated evidence collection changes audit preparation.
7 min readA technical walkthrough of the CDA architecture - how multi-agent coordination works without creating a centralised decision bottleneck.
15 min readAutonomous response raises a legitimate question - who decides what the machine does? This post covers how PulseADT's policy layer keeps humans in control by design.
10 min readMapping PulseADT's ADT Evidence Layer output to the updated PCI-DSS v4.0 control set - and where the gaps still require manual process.
8 min readToday we are opening Eagle Max - Class 1 and Class 2 autonomous response - to all customers. Here is what that means and what you can do with it.
5 min readHow ADT Signal Intelligence correlates SS7 signalling anomalies with identity events to catch SIM-swap fraud chains before subscriber impact.
11 min readIndependent Glemad Research benchmarks across the PulseADT deployment base. MTTD, containment rates, analyst hours saved, and coverage metrics.
6 min readPublished when there is something worth saying. No filler content. Unsubscribe in one click.
No spam. Unsubscribe any time.