Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

TCS Shows Telemedicine Improvements and more at #MWC15

March 2, 2015


TCS had a wealth of interesting news at MWC - probably the most interesting was their VirtuMedix solution which is a HIPAA compliant virtual telemedicine solution allowing doctors and patients to securely communicate in order to minimize the need for in-person visits. In a live demo they showed me how a patient could get added to a queue after paying a fee for service and the doctor could then choose to take the audio or video call. From that point they communicate via WebRTC and can share photos if needed, of a rash for example.

The doctor has a fully integrated portal which links to billing and prescription systems and patients for their part get help entering their malady as the system is prepopulate with popular ailments.

In all, this is a very slick solution - they even have an integrated refund which can be sent to a patient if it is deemed they are better off going to the emergency room after all.

TCS is also working on connected car solutions - helping to harden the solutions to prevent buffer overruns and other issues which could be exploited by hackers. Penetration testing via range checks is one of the way they do this.






Citrix Boosts Mobile Solutions to Carriers, Enterprise

March 2, 2015

Citrix was showing off a lot of interesting solutions at MWC 2015, starting with the MPX 25000, a device which provides ADC functionality for carriers utilizing an NFV approach of using OTS hardware instead of customized solutions. The company tells me this gives them a 300% increase in price/performance over ASIC-based competitors. Moreover, the company's approach allows growing carriers to leverage cloud-based versus telco manageability meaning you get a single virtual interface as your solution grows with the addition of more OTS servers as opposed to fork-lifting boxes in exchange for ever-larger ones.



Carriers can use this device to get up to 80 virtualized sessions to help in various areas of their network such as diameter signaling, NAT, traffic steering and DNS.

Finsphere and Visa Just Made Credit Cards Smarter

February 12, 2015

One of the biggest credit card challenges for users is seeing charges get declined because of potential fraud. In families and many companies, a central card can be shared by many people and when the credit card company flags a potentially fraudulent transaction and alerts the cardholder, it is possible that the card gets immediately cancelled out of fear. This can happen, even if transactions aren’t really fraudulent and in turn can cause a cascade of problems related to automated payments and other pending transactions within the family or organization.

In my experience, the banks are getting better at communicating with their customers about the potential for a transaction to be fraudulent but they are far from perfect.

How Sony May be Fighting to Unleak its Information

December 12, 2014

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent or actors has been released. In just one incident a director called Angelina Jolie a spoiled, untalented, egomaniacal Brat. Then there were racially charged comments about President Obama. A leak of tens of thousands of salaries and social security numbers. The leak of contractor salaries, movies and discussions regarding costs related to movies.

You need a Flip Phone for Your Data Center

December 3, 2014



The big news of the week is celebrities are eschewing smartphones for flip phones. What you ask? Yes, flip phones, those clamshell devices which most people associate with the luddite relative you just saw at Thanksgiving. The reason?

AirHopper: Even Air-Gap Networks are Not Secure

November 20, 2014

It’s a good time to be in the Cybersecurity business.



Quite often, highly secure computers are disconnected from the outside world so as to not get hit by hackers. However, it seems these air-gap networks named for their isolation from other computers are not as secure as we once thought. A hacker can get to these networks in the following manner. They design software which logs the keystrokes and subsequently transmits this information via FM radio signals generated by the graphics card - without changing the display so the user doesn't detect the attack.

EasyNDA aims to Lubricate Business

October 9, 2014

We live in a sharing society which seems to be divided by generational lines which dictate your level of privacy. 30 and under? You likely share virtually everything about yourself online. Older than that and you probably guard your privacy more.

SOTI Helps Manage the Phones that Save Lives

October 2, 2014

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices which are logging onto corporate systems and using company wireless networks. In fact, more than ever, they have to focus more on potential BYOD threats.



In a recent meeting with SOTI, a major player in the space, they announced they had 50 android OEMs using their platform.

Will George Clooney's Wedding Popularize Burner Phones in Your Company?

September 29, 2014

This morning, news broke that even more celebrity nude photos of have leaked and that George Clooney handed out burner phones to wedding guests to ensure any photos taken didn’t show up on the internet after accounts got hacked. The interesting point here is that what Clooney is saying is his wedding is only as secure as the weakest cellphone password. As you might imagine, TMZ was not amused.

This security measure makes sense… George’s security team was able to remotely monitor all photos taken meaning they would also know who leaked a specific photo.

Finally Some Sanity at the FAA and EASA

September 26, 2014


For many years I have complained about FAA regulations that defied logic. In 2008 I said the following when pondering if gadgets make airplanes crash:
First you can use laptops on planes -- even during take off. Then you can't. Then you can -- but not after the aircraft door closes.


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 63 Next
Featured Events