Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

cybersecurity tag

Drill down on cybersecurity search:

25 result(s) displayed for cybersecurity (1 - 25 of 41):

Dispersive Networks Hopes to Be the Future of Secure Networking

The December 2015 Ukraine power grid cyberattack was the first successful attack on a power grid and this event gave rise to Dispersive Networks. According to Wikipedia, the attack was complex consisting of the following steps: Prior compromise of corporate networks...

Array Networks: Laser Focus on Private Cloud Security and Networking

Recently we shared how MSPs and resellers in telecom are going in three directions: The first is business as usual. They continue to sell boxes and/or cloud services. Sometimes they'll just refer the business to the UCaaS provider and other times,...

AireSpring Going The Extra Mile For Customers

AireSpring continues its rapid hosted growth according to Danial Lonstein (pictured below) who recently became the President and Chief Revenue Officer. To accommodate their expansion, Danial explained in an exclusive live interview that they recently moved to a new headquarters in Van...

Kollective Improves Network Performance via P2P Technology

Enterprise network congestion on continues to be a problem as software updates and files continue to grow in size. Add to these challenges, the fact that increasingly, enterprises expect to be able to communicate via video seamlessly.In fact, more than 2,000 US and...

Could Scheduling Logins Make us Safer?

Hackers are relentless. Today it was discovered the Consumer Financial Protection Bureau (CFPB) suffered at least 240 data breaches and another 800 suspected hacks, according to Mick Mulvaney, the acting director of the bureau in congressional testimony.The City of Atlanta has...

FCC CTO Eric Burger and TMC CEO Rich Tehrani to Keynote Ideacom 2018

The pace of change in technology continues to increase and if your company generates its income from helping customers deal with these advancements, it's up to you to stay on the cutting edge of technology. Moreover, you need a general...

Chelsea Manning: Top U.S. Traitor and Leaker, May Become Senator

History Will Remember the U.S. Government as Going too Easy on Hackers and Leakers Photo courtesy of APThe United States made a nuclear deal with Iran and also paid a ransom to have numerous American hostages/prisoners returned. In exchange, billions...

The Enterprise will Embrace SD-WAN in 2018

SD-WAN is rapidly becoming a cornerstone next-gen IT service embraced by companies of all sizes. Some of the benefits of software-defined wide area networks are cloud security, easier hybrid cloud deployment and applications performance management. What many companies will tell...

Windstream's Unique SD-WAN Position

As the SD-WAN market continues to thrive and resellers and MSPs look to add these solutions to their arsenal, an important question to ask is what is happening to what we might call legacy solutions potentially displaced by software-defined wide...

Diverse Broadband Roots Gives Hughes an SD-WAN Edge

One of the most demanding communications environments is satellite where bandwidth can be extremely limited yet real-time communications is a necessity as soldiers need to communicate with others - potentially thousands of miles from the battlefield. Over the years, VoIP...

MegaPath Leverages Years of Experience to Lead in SD-WAN

MegaPath is in a unique position in the SD-WAN space as they were on the leading edge of the MPLS curve and SD-WAN in many cases is becoming a competing or even next-generation technology. In 2012, the company even...

TELoIP Brings SD-WAN to Companies of All Sizes

The market predictions for SD-WAN growth show a hockey-stick. What is most interesting about this growth is it’s literally across the spectrum from the SMB or small business all the way up to the enterprise. It’s unusual for a technology...

SD-WAN is Booming and Airespring is Providing its Customers Innovative Solutions

SD-WAN is eating the WAN, cloud and IP communications all at once. We’ve all seen the amazing projections of market growth but the question is why? To gain insight, we looked to some of the most well-respected thought leaders in...

Media and Obama Responsible for HBO Hack?

There is a direct trail from the U.S. media to the hack of HBO and many others. Of course the media isn't alone. It had an accomplice in the Obama administration that had an opportunity of a lifetime to put...

Hackers Now Threaten Death to Schools and other Types of Extortion

Hackers are now breaking into schools which typically have lax security relative to corporations and once in, they access student information and use it to threaten death to students. Mentioning Sandy Hook - a horrific school shooting in Connecticut, a...

MSP Expo: The Managed Services Opportunity has Never Been Greater

While some predicted the death of the MSP market thanks to cloud, the truth is cloud has been a double-edged sword. In the one hand, over time, the move to cloud means less money for managed service providers in terms...

Bitly Hack Destroys Trust in the Web

Bit.ly, the popular URL shortening service was hacked in 2014 and reports are now surfacing that millions of the these accounts are available online. This is an absolutely huge deal and will lead to the following problems: A total screw-up...

Equifax Reminds us Cybersecurity is a Corporate, not IT Problem

The largest consumer breach of all time - until now comes to us courtesy of Equifax. Americans think criminal hacking is the greatest technology risk to their health, safety and prosperity and they are right. What makes this breach so...

Lack of Cybersecurity Training Just Cost 8 Million Dollars

The Cybersecurity problem gets worse by the day and as we have covered before, there is an increase in attacks targeting money-transfer. In fact, while ransomware isn't going away any time soon, the sheer amount of money which can be...

The Long Tail of Cybersecurity

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.The online world...

Stupid Mistakes Lead to Kelihos Botnet Spam Lord Arrest

Russian Pyotr Levashov spread ransomware and other malicious software through the Kelihos botnet, possibly hacked the U.S. election and probably ran the Waledac spam botnet.In 2009, Levashov was charged with operating the notorious Storm botnet, Kelihos’ predecessor. According to anti-spam...

Forward This Post to Employees To Protect From Hackers

Although there is no guarantee you can be 100% protected against hacking, there are some basics you can share with workers to reduce the chance you will be hit by a cyberbreach such as malware or cryptolocker ransomware. Without further...

How Microsoft Just Scared the IT Community to Death

Brad Smith, the President and Chief Legal Officer at Microsoft spoke recently at a conference and wrote about the need for a Digital Geneva Convention which would do a number of things. For example, it would eliminate targeting of tech companies, assist...

Methbot: These ARE the Russian Cybercriminals We're Looking For

We have heard that Russian hacking caused Hillary Clinton the election for the last few weeks. But some surmise that pushing this narrative was done expressly to sway electors. Now that the vote is behind us - perhaps the Russian...

The Utter Hypocrisy of Feigned Russian Hacker Outrage

From the president to the mainstream media, all of a sudden it seems state-sponsored hacking is a problem Whether you believe Barack Obama’s presidency was a failure or a success, there is no doubt on the subject of cybercrime, this...
1 2 Next
Featured Events