Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Surprise! Microsoft Surface Pro 3 Not Airplane Friendly

July 1, 2014

Whether you think the Surface Pro 3 is a good product or not depends a great deal on the applications you plan on using and the specific needs you have. It is better than an iPad and a MacBook Air in many ways and also worse. While I have had about a week to use the device I have found it is a lot more productivity-inducing than an iPad Air if you get tremendous volumes of email like I do. Specifically, Outlook 2013 is a much better interface than the email client on an iPad.

Alcatel-Lucent: NFV Can be More Secure than Legacy

June 16, 2014

As NFV and SDN usher in a new era of software telcos, there are just so many pieces which have to be put into place to enable solutions from disparate vendors to interoperate smoothly. Moreover, carriers are always looking for one throat to choke and NFV really opens up the carrier network is so many new ways that determining who is responsible for issues is more difficult.

Security has always been a major focus for operators. Indeed, when their networks were proprietary and thought to be bulletproof, it was determined a simple whistle distributed in a box of Captain Crunch cereal could give access to hackers.

Edward Snowden Interview is Quite Revealing

May 29, 2014

If you missed the Edward Snowden interview what you should know is he tried to use proper whistle-blower channels to get the word out about the US population being spied upon. This has been confirmed in fact by NBC News. He was generally told to shut up and it was explained to him he better not go public with the information he had.

Moreover, he went on to say that virtually all electronics can be turned into a microphone remotely and other truly scary things to anyone who takes their freedom and civil liberties seriously.

One other point is he says he was at a much higher position in our intelligence services than the government and president has told us. Take a look and decide for yourself who you believe is more trustworthy.





Metaswitch Forum 2014 Live Blog

May 13, 2014


Metaswitch Forum 2014 will kick off soon, stay tuned.

Any second now - its 8:05 am in New Orleans

The event has kicked off with a keynote presented by Steve Gleave - which has been preceded by a few well-produced videos. The idea so far is tying in the theme of the event "The brains of the new global network" with Steve's brain. The cast of characters behind the scenes show how they tinker with Steve's brain - he eventually comes out on stage on a Segway with Harley Davidson sound-effects.


Russia and US Internet Freedoms Go In Opposite Directions

May 7, 2014

Edward Snowden left the US and fled to Russia after effectively causing the largest security leak in US history and today, both countries seem to be going in somewhat opposite directions with regards to electronic freedom. In the case of the US, there are two competing bills which are designed to limit bulk collection of phone records. The Guardian has a good write up of the situation.

In summary, there is the The USA Freedom Act, designed to prevent the US government from collecting US phone data in bulk, passed by the House Judiciary Committee with a 32 to zero bi-partisan vote, making it the first surveillance reform bill to proceed out of committee and to the House floor.

Will Target CEO Removal Help Boost IT Security?

May 6, 2014




Corporate security needs to be taken very seriously – especially in light of the fact that hackers can be nation-states, organized crime syndicates or other groups with significant resources. To date, companies in the US and elsewhere have shown they are vulnerable to attacks. And to be quite honest, with all the software which companies run, each with frequent updates and patches, corporate networks can seem more like Swiss cheese than Fort Knox.


Still, companies can and need to do more.

How SmartSenseCom uses Microphones to Detect Drone Threats

April 29, 2014



A frequent concern I have shared these past months is drones used as weapons – whether they are equipped with firearms or explosives. Security today is quite-often a two-dimensional affair, especially in outdoor arenas such as stadiums where a pat down and metal detector are typically used to ensure there aren’t any dangerous items being brought in. When a third-dimension becomes available to criminals and terrorists, the situation quickly spirals in complexity.

The question civilized society has to ask is how do we prevent crime and terrorism as the threat evolves from 2D to 3D?







Enter SmartSenseCom Inc., a company in semi-stealth mode using ultra-sensitive microphones (PDF) to detect the electric motors associated with flying objects.

Emerging Threats IQRisk Query An Essential Security Tool

April 3, 2014

About a year ago, I shared there are 250,000 plus new pieces of malware being produced each day. Moreover, I explained how Emerging Threats thinks they can help with the problem. If there is one constant, it is that number – 250,000 new pieces of malware are still being detected daily by the company according to Ken Gramley, CEO.

Elastica Builds an SOC in the Cloud for the Cloud

April 2, 2014

Companies have a challenge that as more data has moved to cloud apps, they have lost the traditional visibility, threat detection and control they used to enjoy. As they evolve from a CAPEX model to OPEX in search of best-in-breed apps, there remains a large security hole which needs filling.

This is where elastica (recently out of stealth mode) comes in… In a conversation with Eric Andrews VP of Marketing and Rehan Jalil President & CEO, they told me that companies need to be able to track activity in and out of these cloud services. They attack security through a suite of cloud-based services as follows:

  • Their AUDIT shadow IT solution looks at the SaaS apps being used and reports how vulnerable each one is.

Mojave Networks Hopes to Solve BYOD Security Challenge

April 2, 2014

BYOD is not new but what has yet to be addressed properly by many organizations is security relating to this plethora of unknown devices. Quite frankly there are many holes in any corporate network where mobile devices are being used. MDM solves some of these challenges but it wasn’t originally designed to keep malicious apps and actors off your network. The Target data breach caused many millions of dollars of reputational damage and potentially long-term marketshare loss for the retailer.

Featured Events