Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security tag

Drill down on Security search:

25 result(s) displayed for Security (1 - 25 of 189):

The Scary Apple Pay Takeover iconectiv Helps Stop

Personally Identifiable Information or PII is leaking out of companies faster than ever. Equifax had two major hacks in a matter of months, Yahoo had three-billion emails stolen and so on. We could devote this entire post to various hacks...

AdaptiveMobile: CSOs Flying Blind if They Can't Monitor Mobile Networks

SS7 is the signaling protocol for the world’s telecom networks and like the internet, it wasn’t really designed with security in mind. The assumption back in the day was the telecom operators were all trusted nodes on the network. It...

MultiTech Continues IoT Leadership in LPWA and Security

One of the longest-running companies in the connectivity business, MultiTech has stepped up their IoT leadership. Specifically, in the world of LPWA. At MWC Americas the company demoed NB-IoT with T-Mobile. Company spokesperson Sarah Brown told me in an in-person...

Intermedia Anti-Phishing Tools for Small Business

Large companies generally have IT teams to deal with phishing attacks but really, there is no perfect defense from a determined phisher who wants to get you to click on a link. Once you click, they could install a backdoor...

StaffAlerter Provides Value in Emergency Notification and IoT

With terrorist attacks and other shooting incidents becoming commonplace, the need to quickly notify large groups of people regarding dangerous situations seems to have never been greater. While many of the solutions on the market are targeted at governments or...

HPE Composable Infrastructure Turns Data Centers into a Mini-Google

Fans of search engine history likely know that Google benefited greatly due to the timing of its launch. Whereas Yahoo launched when dotcom money flowed, allowing it to buy million-dollar SUN servers like they were going out of style (they...

Portnox Adds Visibility and Control To Help Secure Networks

Networks have become so complex that securing them has become an increasingly complex challenge. As the number of attack vectors increase seemingly endlessly, corporations need to have a commensurate solution which scales with device growth, allowing IT to protect their...

Tempered Networks Boosts Trust with Identity-Defined Networks

If you missed Paula Bernier’s article (free registration required) in our IoT Evolution Magazine, you may not have known Tempered Networks is the new name for Asguard – which is pronounced the same way as Thor’s home-world but spelled with...

The Drone Wars Have Arrived

An army of good drones will protect our high-value targets at all times. In February 2014 we warned of the impending urban drone wars: The police department after dealing with this incident is forced to develop a policy which entails the...

How Microsoft Just Scared the IT Community to Death

Brad Smith, the President and Chief Legal Officer at Microsoft spoke recently at a conference and wrote about the need for a Digital Geneva Convention which would do a number of things. For example, it would eliminate targeting of tech companies, assist...

The Utter Hypocrisy of Feigned Russian Hacker Outrage

From the president to the mainstream media, all of a sudden it seems state-sponsored hacking is a problem Whether you believe Barack Obama’s presidency was a failure or a success, there is no doubt on the subject of cybercrime, this...

Yahoo! Cybersecurity Breach Helps Lower Value by $1 Billion

If you need a wake up call on how much a cybersecurity breach will cost, take a look at Yahoo who may have just lost $1 billion dollars in their sale to Verizon. In addition, Yahoo! was outed - although...

Is Yahoo the Preferred E-Mail of Terrorists?

Some weird news is coming out about Yahoo! secretly providing the FBI and NSA with information about users who utilize certain phrases in their emails. This would make a lot of sense from a security standpoint but obviously destroys everyone's...

You Can Get Fired for Choosing Dropbox: A True Story

An MSP is contacted by a publicly traded company looking for help managing their IT. When the MSP goes to the company conference room to tell them about how they can protect their servers, the decision-maker explains they don’t have...

The New Threat: Drones Attacking Industrial Systems

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior...

Aricent: How to be Digitally Durable

"APIs are now a business model!""A company that has more APIs has more value."If every industry is being digitally disrupted (it is) then the question companies need to ask is how to remain digitally durable. If you want insight into...

API of the Week: Trulioo Provides Instant Identity Verification

As hackers have become more successful, they have become emboldened and are able to attack companies via ransomware and malware as well as individuals via password theft. As ever-increasing amounts of crucial information are available electronically, the challenge then is...

API of the Week: Vidyo APIs Add Value All Around Us

If you want your company to have a tremendous valuation, make it an integral part of a platform which allows others to benefit financially from effectively selling your products and services. Tens of thousands of resellers promote Microsoft software, hundreds...

Inside Dark Web Live Blog 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the...

Masergy's People-Directory Vision Has Potential

Dean Manzoori describes Masergy as a technology company which own and manages the world’s largest global private network providing cloud network, managed security and UC as a service. To ensure the highest level of quality, their UC platform is embedded...

Inside Dark Web Conference: Why TMC Teamed with Alan Meckler

  Alan Meckler is one of the brightest visionaries in the tech world having launched the first show covering the Internet in the 1990s – Internet World, part of Mecklermedia. He was underestimated and denigrated by virtually all the traditional...

State of the IoT Market: Kore, Polaris, Cradlepoint

Cradlepoint talks scaling IoT at IoT Evolution ExpoAt the most recent IoT Evolution Expo in Fort Lauderdale, Florida, we had a chance to interview a number of the companies shaping the future of the IoT space. Cradlepoint (below) for example...

Politically Motivated Hackers Hit Nissan, Are You Prepared?

Quite often when we think about hackers, we imagine there is someone looking to gain something of value from us. In response, we plan our computer and network security strategy with this in mind. For example, many attacks have targeted...

Lasers are the Future of Drone Fighting

I’ve been among the first people to realize how drones can be a major problem for security in the world. In February 2014, in fact, I said there was a coming urban drone war and since then, drones with guns...

CyberFlow Analytics Detects Cybersecurity Breach Anomalies

Security experts agree – there is absolutely no way to ensure your network is 100% safe from cybercriminals – if they really want to get in, they will. All you can do is put as many layers down in front...
1 2 3 4 5 6 7 8 Next
Featured Events