Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Metaswitch Forum 2014 Live Blog

May 13, 2014


Metaswitch Forum 2014 will kick off soon, stay tuned.

Any second now - its 8:05 am in New Orleans

The event has kicked off with a keynote presented by Steve Gleave - which has been preceded by a few well-produced videos. The idea so far is tying in the theme of the event "The brains of the new global network" with Steve's brain. The cast of characters behind the scenes show how they tinker with Steve's brain - he eventually comes out on stage on a Segway with Harley Davidson sound-effects.


Russia and US Internet Freedoms Go In Opposite Directions

May 7, 2014

Edward Snowden left the US and fled to Russia after effectively causing the largest security leak in US history and today, both countries seem to be going in somewhat opposite directions with regards to electronic freedom. In the case of the US, there are two competing bills which are designed to limit bulk collection of phone records. The Guardian has a good write up of the situation.

In summary, there is the The USA Freedom Act, designed to prevent the US government from collecting US phone data in bulk, passed by the House Judiciary Committee with a 32 to zero bi-partisan vote, making it the first surveillance reform bill to proceed out of committee and to the House floor.

Will Target CEO Removal Help Boost IT Security?

May 6, 2014




Corporate security needs to be taken very seriously – especially in light of the fact that hackers can be nation-states, organized crime syndicates or other groups with significant resources. To date, companies in the US and elsewhere have shown they are vulnerable to attacks. And to be quite honest, with all the software which companies run, each with frequent updates and patches, corporate networks can seem more like Swiss cheese than Fort Knox.


Still, companies can and need to do more.

How SmartSenseCom uses Microphones to Detect Drone Threats

April 29, 2014



A frequent concern I have shared these past months is drones used as weapons – whether they are equipped with firearms or explosives. Security today is quite-often a two-dimensional affair, especially in outdoor arenas such as stadiums where a pat down and metal detector are typically used to ensure there aren’t any dangerous items being brought in. When a third-dimension becomes available to criminals and terrorists, the situation quickly spirals in complexity.

The question civilized society has to ask is how do we prevent crime and terrorism as the threat evolves from 2D to 3D?







Enter SmartSenseCom Inc., a company in semi-stealth mode using ultra-sensitive microphones (PDF) to detect the electric motors associated with flying objects.

Emerging Threats IQRisk Query An Essential Security Tool

April 3, 2014

About a year ago, I shared there are 250,000 plus new pieces of malware being produced each day. Moreover, I explained how Emerging Threats thinks they can help with the problem. If there is one constant, it is that number – 250,000 new pieces of malware are still being detected daily by the company according to Ken Gramley, CEO.

Elastica Builds an SOC in the Cloud for the Cloud

April 2, 2014

Companies have a challenge that as more data has moved to cloud apps, they have lost the traditional visibility, threat detection and control they used to enjoy. As they evolve from a CAPEX model to OPEX in search of best-in-breed apps, there remains a large security hole which needs filling.

This is where elastica (recently out of stealth mode) comes in… In a conversation with Eric Andrews VP of Marketing and Rehan Jalil President & CEO, they told me that companies need to be able to track activity in and out of these cloud services. They attack security through a suite of cloud-based services as follows:

  • Their AUDIT shadow IT solution looks at the SaaS apps being used and reports how vulnerable each one is.

Mojave Networks Hopes to Solve BYOD Security Challenge

April 2, 2014

BYOD is not new but what has yet to be addressed properly by many organizations is security relating to this plethora of unknown devices. Quite frankly there are many holes in any corporate network where mobile devices are being used. MDM solves some of these challenges but it wasn’t originally designed to keep malicious apps and actors off your network. The Target data breach caused many millions of dollars of reputational damage and potentially long-term marketshare loss for the retailer.

Could Better use of Technology have Stopped the Malaysia Airlines Flight 370 Tragedy?

March 8, 2014

Last night, many of us went to sleep with the knowledge that Malaysia Airlines Flight 370 was missing and this morning the news broke that the plane hasn't been found. Considering it is virtually impossible to steal a Boeing 777, the options at this point aren't looking good. My sincerest sympathies go out to the poor families of those onboard.

SOTI Aims to Make Android More Enterprise Ready

February 25, 2014

Customers deploying mobility solutions have a major challenge in deploying secure solutions to their clients in a BYOD environment. Enterprise Mobility Management is a growing space and at MWC 2014 I had a chance to meet with Carl Rodrigues, President & CEO of Soti and Roula Vrsic, VP of Marketing to learn about how their company helps enterprises maximize their workflow productivity.

Vrsic said enterprises are looking to maximize the number of applications they roll out on mobile. She mentioned how healtchare is going mobile but we may not have envisioned this trend some years ago.

Compass EOS and The Optical Approach to Core Routing

September 25, 2013

As core routers have to handle ever-faster data rates the high-speed connections suffer from a variety of problems as a result of challeenges which have to be overcome in inter-chip communications. Signal integrity becomes a problem over copper lines connecting ASICs as circut AC characteristics begin to dominate the impedance, inductance and conductance of the line and in-turn distort the signal. One way to mitigate these challenges is to utilize decision feedback equalization which consumes large amounts of power. Moreover, crosstalk has to be dealt with as electrical circuit speeds have reached the limits where traditional technology can overcome these effects.

Featured Events