Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

cybersecurity tag

Drill down on cybersecurity search:

25 result(s) displayed for cybersecurity (1 - 25 of 32):

Diverse Broadband Roots Gives Hughes an SD-WAN Edge

One of the most demanding communications environments is satellite where bandwidth can be extremely limited yet real-time communications is a necessity as soldiers need to communicate with others - potentially thousands of miles from the battlefield. Over the years, VoIP...

MegaPath Leverages Years of Experience to Lead in SD-WAN

MegaPath is in a unique position in the SD-WAN space as they were on the leading edge of the MPLS curve and SD-WAN in many cases is becoming a competing or even next-generation technology. In 2012, the company even...

TELoIP Brings SD-WAN to Companies of All Sizes

The market predictions for SD-WAN growth show a hockey-stick. What is most interesting about this growth is it’s literally across the spectrum from the SMB or small business all the way up to the enterprise. It’s unusual for a technology...

SD-WAN is Booming and Airespring is Providing its Customers Innovative Solutions

SD-WAN is eating the WAN, cloud and IP communications all at once. We’ve all seen the amazing projections of market growth but the question is why? To gain insight, we looked to some of the most well-respected thought leaders in...

Media and Obama Responsible for HBO Hack?

There is a direct trail from the U.S. media to the hack of HBO and many others. Of course the media isn't alone. It had an accomplice in the Obama administration that had an opportunity of a lifetime to put...

Hackers Now Threaten Death to Schools and other Types of Extortion

Hackers are now breaking into schools which typically have lax security relative to corporations and once in, they access student information and use it to threaten death to students. Mentioning Sandy Hook - a horrific school shooting in Connecticut, a...

MSP Expo: The Managed Services Opportunity has Never Been Greater

While some predicted the death of the MSP market thanks to cloud, the truth is cloud has been a double-edged sword. In the one hand, over time, the move to cloud means less money for managed service providers in terms...

Bitly Hack Destroys Trust in the Web

Bit.ly, the popular URL shortening service was hacked in 2014 and reports are now surfacing that millions of the these accounts are available online. This is an absolutely huge deal and will lead to the following problems: A total screw-up...

Equifax Reminds us Cybersecurity is a Corporate, not IT Problem

The largest consumer breach of all time - until now comes to us courtesy of Equifax. Americans think criminal hacking is the greatest technology risk to their health, safety and prosperity and they are right. What makes this breach so...

Lack of Cybersecurity Training Just Cost 8 Million Dollars

The Cybersecurity problem gets worse by the day and as we have covered before, there is an increase in attacks targeting money-transfer. In fact, while ransomware isn't going away any time soon, the sheer amount of money which can be...

The Long Tail of Cybersecurity

The long-tail, a term coined to describe the ability for organizations to sell vast amounts of products in small quantities accurately describes how a music store like iTunes can generate massive quantities of profit selling virtually limitless inventory.The online world...

Stupid Mistakes Lead to Kelihos Botnet Spam Lord Arrest

Russian Pyotr Levashov spread ransomware and other malicious software through the Kelihos botnet, possibly hacked the U.S. election and probably ran the Waledac spam botnet.In 2009, Levashov was charged with operating the notorious Storm botnet, Kelihos’ predecessor. According to anti-spam...

Forward This Post to Employees To Protect From Hackers

Although there is no guarantee you can be 100% protected against hacking, there are some basics you can share with workers to reduce the chance you will be hit by a cyberbreach such as malware or cryptolocker ransomware. Without further...

How Microsoft Just Scared the IT Community to Death

Brad Smith, the President and Chief Legal Officer at Microsoft spoke recently at a conference and wrote about the need for a Digital Geneva Convention which would do a number of things. For example, it would eliminate targeting of tech companies, assist...

Methbot: These ARE the Russian Cybercriminals We're Looking For

We have heard that Russian hacking caused Hillary Clinton the election for the last few weeks. But some surmise that pushing this narrative was done expressly to sway electors. Now that the vote is behind us - perhaps the Russian...

The Utter Hypocrisy of Feigned Russian Hacker Outrage

From the president to the mainstream media, all of a sudden it seems state-sponsored hacking is a problem Whether you believe Barack Obama’s presidency was a failure or a success, there is no doubt on the subject of cybercrime, this...

Ransomware Fog Rolls over SanFran Muni, SFMTA

We’ve known ransomware costs for a small- to medium-sized business can be $99,000, per Kapersky Labs. This includes lost business data, productivity and perhaps trade secrets or proprietary information, as well as increased spending on IT security. A new...

Yahoo! Cybersecurity Breach Helps Lower Value by $1 Billion

If you need a wake up call on how much a cybersecurity breach will cost, take a look at Yahoo who may have just lost $1 billion dollars in their sale to Verizon. In addition, Yahoo! was outed - although...

Cybersecurity and the Terrible, Horrible, No Good, Very Bad Week

There are perhaps four major cybersecurity incidents in my mind which are world-changing. The first is the OPM data breach which allowed China to get the most intimate secrets of virtually all federal employees – tens of millions of them....

You Can Get Fired for Choosing Dropbox: A True Story

An MSP is contacted by a publicly traded company looking for help managing their IT. When the MSP goes to the company conference room to tell them about how they can protect their servers, the decision-maker explains they don’t have...

President Obama, After $400 Million, Where are Those Criminal Iranian Hackers ?

Why did we ship a fortune to our mortal enemy and not get the indicted cybercriminals living in Iran who attacked us, in return? The U.S. is in a cyberwar. It's common knowledge. If you did have a doubt, it...

The New Threat: Drones Attacking Industrial Systems

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior...

API of the Week: Trulioo Provides Instant Identity Verification

As hackers have become more successful, they have become emboldened and are able to attack companies via ransomware and malware as well as individuals via password theft. As ever-increasing amounts of crucial information are available electronically, the challenge then is...

The Opportunities of the Dark Web

What I learned from the first-ever dark web event. Yesterday, we held the world’s first Dark Web conference called Inside Dark Web – with partners Bob Miko and Alan Meckler. When we first decided to launch the event we discussed...

Inside Dark Web Live Blog 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the...
1 2 Next
Featured Events