Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Politically Motivated Hackers Hit Nissan, Are You Prepared?

January 15, 2016

Quite often when we think about hackers, we imagine there is someone looking to gain something of value from us. In response, we plan our computer and network security strategy with this in mind. For example, many attacks have targeted credit cards as companies like Target have learned about the hard way. Their breach cost them hundreds of millions - $200 million actually and counting.

My Thoughts on the Iran Dam Hacking in Rye, NY

December 21, 2015

ISIS Brings Flip-Phone to Crowd-Sourced Cyber-Hacking Fight.

November 19, 2015

Its an interesting world we live in where a group like Anonymous which likely wasn't thought very highly has become a savior thanks to their efforts to combat ISIS. The Obama administration, Putin and the rest of the world which has lost their citizens to ISIS may have done less to hurt this organization in 18 months than Anonymous has done in a few days of fighting this organization.

President Obama has said repeatedly and so has Hillary Clinton that we are fighting an ideology. So any logical and sane person would put two and two together and figure out if ISIS is using social media extremely well to spread their ideology, then maybe we should shut down their twitter accounts, right? Doesn't the CIA and NSA have tens of billions of dollars at their disposal to keep the US safe?

BuckleMate Reduces Teen Injuries Through Smart Monitoring

September 24, 2015



You really need to have nerves of steel when you give the car keys to your teen child for the first time. At that very moment, a parent can have a traumatic episode where they remember their child's entire life while simultaneously reliving every near-miss collision and accident they've ever witnessed or been involved in.

The good news is, technology allows new and innovative solutions to this problem most every parent may have to face at one time or another. Specifically, BuckleMate was founded by Jeffrey Miller who serves as CEO, to deal with this issue. The following interview goes into detail regarding how his company can help make teen driving a safer endeavor and perhaps it can become simultaneously less traumatic.

Tell me about BuckleMate – how did the idea come to you?



I came across a product about 5 years ago that would force drivers to Buckle their seat belts. 





VoicePIN Voice Biometrics Brings New Tech to Phone and Apps

August 31, 2015



The biometrics market has been around for decades but never achieved widespread acceptance until after Apple rolled out TouchID. Laptop makers flirted with the technology about a decade ago but never got their systems to work very well. Apple – to its credit, released a solution which is very good.

Lasers are the Future of Drone Fighting

August 31, 2015

I’ve been among the first people to realize how drones can be a major problem for security in the world. In February 2014, in fact, I said there was a coming urban drone war and since then, drones with guns and explosives have been created. More recently I wrote about drones almost being used to attack federal buildings in Connecticut – thankfully without success and how a drone flew to the White House. I even wrote about a possible solution to the problem using microphones from SmartSense.

Clinton's BYOD Phones, E-mail Server May Achieve Bin Laden's Goal

August 20, 2015

One of Osama Bin Laden’s goals was to assassinate president Obama in order to get Joe Biden promoted to president.

Said Bin Laden:

Obama is the head of infidelity and killing him automatically will make [Vice President] Biden take over the presidency. . . . Biden is totally unprepared for that post, which will lead the U.S.

CyberFlow Analytics Detects Cybersecurity Breach Anomalies

August 17, 2015

Security experts agree – there is absolutely no way to ensure your network is 100% safe from cybercriminals – if they really want to get in, they will. All you can do is put as many layers down in front of them to make your system less attractive. In addition, malicious users have become experts at writing code which varies its port usage and encrypts packets to be virtually invisible to many of today’s forensic tools as they hide in normal traffic flows.

Moreover, breaches typically start with a break-in or infiltration, then there is reconnaissance and finally, exfiltration.

SDN and Micro-Segmentation boost Security for BYOD According to AirWatch/VMware

June 8, 2015

The proliferation of mobile devices and cloud services has caused a geometric increase in security threat possibilities as each device type and OS version can potentially be vulnerable. In addition, these devices need access to more and more cloud information – which means even more opportunities for attackers to hitch a ride along a VPN tunnel and then move laterally in the data center in the search for information to harvest or other damage to cause.

Some people questioned the acquisition of AirWatch by VMware as BYOD and MDM live in a space far removed from virtualization. The benefits of the deal however are beginning to come to fruition as the company has shown its grand vision of allowing mobile devices access to specific information in the corporate data center.

The Drone War Hits the White House

May 14, 2015


A man was just detained outside the White House for trying to fly a drone over the fence. It is too soon to know the intentions of the flyer but this is something I have warned about for some time. I first sounded the alarm over a year ago in a piece titled the Coming Urban Drone War. the challenge is as time goes on, the flying range of drones will increase meaning the ability to stop people from flying them by visually seeing them and taking action, will cease.



There may be technological solutions to the problem such as SmartSenseCom but it it unclear if it was used or would have been able to detect this threat soon enough.

In the end, the only solution to incoming drones being flown at targets from three-dimensions is to have security drones as a barrier which take out the bad drones.






1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 65 Next
Featured Events