Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

Security tag

Drill down on Security search:

25 result(s) displayed for Security (1 - 25 of 154):

SOTI Helps Manage the Phones that Save Lives

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices...

Will George Clooney's Wedding Popularize Burner Phones in Your Company?

This morning, news broke that even more celebrity nude photos of have leaked and that George Clooney handed out burner phones to wedding guests to ensure any photos taken didn’t show up on the internet after accounts got hacked. The...

Finally Some Sanity at the FAA and EASA

For many years I have complained about FAA regulations that defied logic. In 2008 I said the following when pondering if gadgets make airplanes crash: First you can use laptops on planes -- even during take off. Then you can't....

Is the US in Store for Another 9/11?

Let me start off apologizing for writing about a non-tech topic and also for a somewhat sensational headline but I believe what I have to say here supersedes my responsibility to just cover the typical topics you come here to...

Edward Snowden Interview is Quite Revealing

If you missed the Edward Snowden interview what you should know is he tried to use proper whistle-blower channels to get the word out about the US population being spied upon. This has been confirmed in fact by NBC News....

Will Target CEO Removal Help Boost IT Security?

Corporate security needs to be taken very seriously – especially in light of the fact that hackers can be nation-states, organized crime syndicates or other groups with significant resources. To date, companies in the US and elsewhere have shown they...

How SmartSenseCom uses Microphones to Detect Drone Threats

A frequent concern I have shared these past months is drones used as weapons – whether they are equipped with firearms or explosives. Security today is quite-often a two-dimensional affair, especially in outdoor arenas such as stadiums where a pat...

Emerging Threats IQRisk Query An Essential Security Tool

About a year ago, I shared there are 250,000 plus new pieces of malware being produced each day. Moreover, I explained how Emerging Threats thinks they can help with the problem. If there is one constant, it is that number...

Elastica Builds an SOC in the Cloud for the Cloud

Companies have a challenge that as more data has moved to cloud apps, they have lost the traditional visibility, threat detection and control they used to enjoy. As they evolve from a CAPEX model to OPEX in search of...

Mojave Networks Hopes to Solve BYOD Security Challenge

BYOD is not new but what has yet to be addressed properly by many organizations is security relating to this plethora of unknown devices. Quite frankly there are many holes in any corporate network where mobile devices are being...

Could Better use of Technology have Stopped the Malaysia Airlines Flight 370 Tragedy?

Last night, many of us went to sleep with the knowledge that Malaysia Airlines Flight 370 was missing and this morning the news broke that the plane hasn't been found. Considering it is virtually impossible to steal a Boeing 777,...

SPEECHPRO's Multifactor Biometric Engine Doubles Reliability

Now that Apple has decided to jump into the biometrics space with Touch ID, we can expect the idea of finger, face and speech recognition to gain more traction. When it comes to biometrics there are different approaches which companies...

AVG Helps Manage Facebook Privacy

AVG Crowdcontrol is designed to make Facebook experiences safer by customizing who can view a status, videos and photos posted on a personal timeline. Sure, you can manage your privacy manually but it is complicated and potentially error-prone. That's why...

Whoops: There is an iPhone 5s Fingerprint Hack

Biometric technology is amazing because when it is working perfectly it really is one of the best ways to ensure an individual's identity is verified. I can't guess your fingerprint for example. Sure, I can try to mimic it like...

Axis Communications Uses APIs and Low-Light Tech to Differentiate

One constant in business has been the ecosystem can be more important than the product. As an example, if a person is considering attending a conference, they typically look at the speakers and exhibitors to see if there is a...

How The Prism Leak Will Hurt US Tech Companies

Now that the world is aware of NSA's Prism program where there seems to be unfettered access to the servers of American web firms, we can expect a brave new world of communications and technology competition. Although it isn't accurate...

MDM is Just too Small a Market for Apple

It is no secret that MDM is a huge market and Apple is in large part responsible for the trend where non-Microsoft and non-Blackberry devices infiltrated the enterprise. Moreover, corporate IT departments have huge budgets so if Apple came...

Now Unclassified PRISM Docs Still Off Limits to Fed Workers

For a federal government riddled with scandals this news may not seem so important but it is indicative of the logic of government. The numerous documents which have been leaked all over the Internet regarding PRISM and countless other government...

Your iPhone Could Get Hacked Through the Charger

As scary as it sounds – that iOS device which you thought was safe from hackers because Apple controls the App Store could get infected through a malicious charger. This is a major concern for IT departments who didn’t previously...

Emerging Threats Combats a Million Plus Pieces of New Malware a Week

There are 250,000 plus new pieces of malware being produced each day equating to one piece per person in the US in just over three and a half years. The question is, what do you do with this onslaught of...

NICE Systems at MWC2013

At Mobile World Congress 2013 in Barcelona NICE had a very compelling story regarding its multiple product lines which are generally analytics, security, financial and the contact center. In a conversation with Yaniv Zukerman and Eyal Kirshner I learned...

Stoke GameChanger Improves Stadium Broadband Delivery

Dan McBride VP Marketing Stoke   Mobile and WiFi gateway solution provider Stoke recently launched at Mobile World Congress 2013 a new solution which is targeted at improving the customer experience at stadiums and metropolitan areas. The company's GameChanger solution...

All Windows Passwords at Risk and What to do about it

With the word out that a 25-GPU cluster can crack every standard Windows password in less than 6 hours, it may be time for us to consider this new Securematrix technology from Japan championed by Itara Nishimura of CSE Co.,...

Anonymous May Have Just Taken Down Go Daddy and Related Sites

After spending five minutes trying to access Go Daddy with zero luck I reached out to my tech team who explained the site was out. The best way to follow the outage seems to be Twitter and there are some...

How Much Freedom Have we Given up Since 9/11?

Peter Radizeski and I have very different political views but where wesee 100% eye-to-eye is on how much privacy we have given up since 9/11. Notice I mention "Freedom" in the headline but then refer to "privacy" in the sentence...
1 2 3 4 5 6 7 Next
Featured Events