Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security

Citrix Boosts Mobile Solutions to Carriers, Enterprise

March 2, 2015

Citrix was showing off a lot of interesting solutions at MWC 2015, starting with the MPX 25000, a device which provides ADC functionality for carriers utilizing an NFV approach of using OTS hardware instead of customized solutions. The company tells me this gives them a 300% increase in price/performance over ASIC-based competitors. Moreover, the company's approach allows growing carriers to leverage cloud-based versus telco manageability meaning you get a single virtual interface as your solution grows with the addition of more OTS servers as opposed to fork-lifting boxes in exchange for ever-larger ones.



Carriers can use this device to get up to 80 virtualized sessions to help in various areas of their network such as diameter signaling, NAT, traffic steering and DNS.

Finsphere and Visa Just Made Credit Cards Smarter

February 12, 2015

One of the biggest credit card challenges for users is seeing charges get declined because of potential fraud. In families and many companies, a central card can be shared by many people and when the credit card company flags a potentially fraudulent transaction and alerts the cardholder, it is possible that the card gets immediately cancelled out of fear. This can happen, even if transactions aren’t really fraudulent and in turn can cause a cascade of problems related to automated payments and other pending transactions within the family or organization.

In my experience, the banks are getting better at communicating with their customers about the potential for a transaction to be fraudulent but they are far from perfect.

How Sony May be Fighting to Unleak its Information

December 12, 2014

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent or actors has been released. In just one incident a director called Angelina Jolie a spoiled, untalented, egomaniacal Brat. Then there were racially charged comments about President Obama. A leak of tens of thousands of salaries and social security numbers. The leak of contractor salaries, movies and discussions regarding costs related to movies.

You need a Flip Phone for Your Data Center

December 3, 2014



The big news of the week is celebrities are eschewing smartphones for flip phones. What you ask? Yes, flip phones, those clamshell devices which most people associate with the luddite relative you just saw at Thanksgiving. The reason?

AirHopper: Even Air-Gap Networks are Not Secure

November 20, 2014

It’s a good time to be in the Cybersecurity business.



Quite often, highly secure computers are disconnected from the outside world so as to not get hit by hackers. However, it seems these air-gap networks named for their isolation from other computers are not as secure as we once thought. A hacker can get to these networks in the following manner. They design software which logs the keystrokes and subsequently transmits this information via FM radio signals generated by the graphics card - without changing the display so the user doesn't detect the attack.

EasyNDA aims to Lubricate Business

October 9, 2014

We live in a sharing society which seems to be divided by generational lines which dictate your level of privacy. 30 and under? You likely share virtually everything about yourself online. Older than that and you probably guard your privacy more.

SOTI Helps Manage the Phones that Save Lives

October 2, 2014

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices which are logging onto corporate systems and using company wireless networks. In fact, more than ever, they have to focus more on potential BYOD threats.



In a recent meeting with SOTI, a major player in the space, they announced they had 50 android OEMs using their platform.

Will George Clooney's Wedding Popularize Burner Phones in Your Company?

September 29, 2014

This morning, news broke that even more celebrity nude photos of have leaked and that George Clooney handed out burner phones to wedding guests to ensure any photos taken didn’t show up on the internet after accounts got hacked. The interesting point here is that what Clooney is saying is his wedding is only as secure as the weakest cellphone password. As you might imagine, TMZ was not amused.

This security measure makes sense… George’s security team was able to remotely monitor all photos taken meaning they would also know who leaked a specific photo.

Finally Some Sanity at the FAA and EASA

September 26, 2014


For many years I have complained about FAA regulations that defied logic. In 2008 I said the following when pondering if gadgets make airplanes crash:
First you can use laptops on planes -- even during take off. Then you can't. Then you can -- but not after the aircraft door closes.


California Lawmakers Plunge Some Transactions into 3rd World

September 11, 2014

California has come up with a law that hurts the very people it says it is protecting by making it difficult to record call center transactions. Penal code 632 of California law says in-part:
(a) Every person who, intentionally and without the consent of all parties to a confidential communication, by means of any electronic amplifying or recording device, eavesdrops upon or records the confidential communication, whether the communication is carried on among the parties in the presence of one another or by means of a telegraph, telephone, or other device, except a radio, shall be punished by a fine not exceeding two thousand five hundred dollars ($2,500), or imprisonment in the county jail not exceeding one year, or in the state prison, or by both that fine and imprisonment. If the person has previously been convicted of a violation of this section or Section 631, 632.5, 632.6, 632.7, or 636, the person shall be punished by a fine not exceeding ten thousand dollars ($10,000), by imprisonment in the county jail not exceeding one year, or in the state prison, or by both that fine and imprisonment.
This is part of a more bewildering law Penal Code 630-638 that seems to be designed to make it exceedingly difficult to do business in the state.

The challenge for business owners is they need to record calls for many reasons such as quality control and government compliance. Now, it is potentially illegal to record such calls without the consent of the caller.

Then there is the importance of keeping a record of all calls for the caller's own protection.



Featured Events