Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security tag

Drill down on Security search:

25 result(s) displayed for Security (1 - 25 of 166):

Lasers are the Future of Drone Fighting

I’ve been among the first people to realize how drones can be a major problem for security in the world. In February 2014 in fact I said there was a coming urban drone war and since then drones with guns...

CyberFlow Analytics Detects Cybersecurity Breach Anomalies

Security experts agree – there is absolutely no way to ensure your network is 100% safe from cybercriminals – if they really want to get in, they will. All you can do is put as many layers down in front...

SDN and Micro-Segmentation boost Security for BYOD According to AirWatch/VMware

The proliferation of mobile devices and cloud services has caused a geometric increase in security threat possibilities as each device type and OS version can potentially be vulnerable. In addition, these devices need access to more and more cloud information...

The Drone War Hits the White House

A man was just detained outside the White House for trying to fly a drone over the fence. It is too soon to know the intentions of the flyer but this is something I have warned about for some time....

CloudGenix Gets Funded to Fuel SD-WANs

Kumar Ramachandran, Co-Founder and CEO of CloudGenix recently sat with me and explained his vision for software-defined enterprise WANS, which use off-the-shelf hardware and allow corporations to abstract their business processes, utilize hybrid network virtualization and network function projection. SD‐WANs...

Expect Security Funding Bubble to Pop in 3-5 Years

Security is one of the hottest areas in tech right now. Indeed, there is infinite possibility in this space because technology inherently has weaknesses and malicious actors seem to always be a step ahead of users and software companies....

SimpleWAN Well Positioned for Security-as-a-Service Growth

The state of IT security is terrible - that is the only conclusion you can make when breach after breach is reported in the news. Keep in mind these are the breaches we hear about... Countless others go unreported. Hackers...

Citrix Boosts Mobile Solutions to Carriers, Enterprise

Citrix was showing off a lot of interesting solutions at MWC 2015, starting with the MPX 25000, a device which provides ADC functionality for carriers utilizing an NFV approach of using OTS hardware instead of customized solutions. The company tells...

Why Cradlepoint is Poised for Growth

We all know the M2M and IoT spaces are growing like crazy... Our own growing M2M Evolution and IoT Evolution shows are just a few examples of how the marketplaces are on fire as a seamlessly never-ending flow of new...

How Sony May be Fighting to Unleak its Information

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent or actors has been released. In just one incident a director called Angelina Jolie a spoiled, untalented, egomaniacal...

You need a Flip Phone for Your Data Center

The big news of the week is celebrities are eschewing smartphones for flip phones. What you ask? Yes, flip phones, those clamshell devices which most people associate with the luddite relative you just saw at Thanksgiving. The reason? They are...

AirHopper: Even Air-Gap Networks are Not Secure

It’s a good time to be in the Cybersecurity business. Quite often, highly secure computers are disconnected from the outside world so as to not get hit by hackers. However, it seems these air-gap networks named for their isolation from...

SOTI Helps Manage the Phones that Save Lives

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices...

Will George Clooney's Wedding Popularize Burner Phones in Your Company?

This morning, news broke that even more celebrity nude photos of have leaked and that George Clooney handed out burner phones to wedding guests to ensure any photos taken didn’t show up on the internet after accounts got hacked. The...

Finally Some Sanity at the FAA and EASA

For many years I have complained about FAA regulations that defied logic. In 2008 I said the following when pondering if gadgets make airplanes crash: First you can use laptops on planes -- even during take off. Then you can't....

Is the US in Store for Another 9/11?

Let me start off apologizing for writing about a non-tech topic and also for a somewhat sensational headline but I believe what I have to say here supersedes my responsibility to just cover the typical topics you come here to...

Edward Snowden Interview is Quite Revealing

If you missed the Edward Snowden interview what you should know is he tried to use proper whistle-blower channels to get the word out about the US population being spied upon. This has been confirmed in fact by NBC News....

Will Target CEO Removal Help Boost IT Security?

Corporate security needs to be taken very seriously – especially in light of the fact that hackers can be nation-states, organized crime syndicates or other groups with significant resources. To date, companies in the US and elsewhere have shown they...

How SmartSenseCom uses Microphones to Detect Drone Threats

A frequent concern I have shared these past months is drones used as weapons – whether they are equipped with firearms or explosives. Security today is quite-often a two-dimensional affair, especially in outdoor arenas such as stadiums where a pat...

Emerging Threats IQRisk Query An Essential Security Tool

About a year ago, I shared there are 250,000 plus new pieces of malware being produced each day. Moreover, I explained how Emerging Threats thinks they can help with the problem. If there is one constant, it is that number...

Elastica Builds an SOC in the Cloud for the Cloud

Companies have a challenge that as more data has moved to cloud apps, they have lost the traditional visibility, threat detection and control they used to enjoy. As they evolve from a CAPEX model to OPEX in search of...

Mojave Networks Hopes to Solve BYOD Security Challenge

BYOD is not new but what has yet to be addressed properly by many organizations is security relating to this plethora of unknown devices. Quite frankly there are many holes in any corporate network where mobile devices are being...

Could Better use of Technology have Stopped the Malaysia Airlines Flight 370 Tragedy?

Last night, many of us went to sleep with the knowledge that Malaysia Airlines Flight 370 was missing and this morning the news broke that the plane hasn't been found. Considering it is virtually impossible to steal a Boeing 777,...

SPEECHPRO's Multifactor Biometric Engine Doubles Reliability

Now that Apple has decided to jump into the biometrics space with Touch ID, we can expect the idea of finger, face and speech recognition to gain more traction. When it comes to biometrics there are different approaches which companies...

AVG Helps Manage Facebook Privacy

AVG Crowdcontrol is designed to make Facebook experiences safer by customizing who can view a status, videos and photos posted on a personal timeline. Sure, you can manage your privacy manually but it is complicated and potentially error-prone. That's why...
1 2 3 4 5 6 7 Next
Featured Events