Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

cybersecurity tag

Drill down on cybersecurity search:

20 result(s) displayed for cybersecurity (1 - 20 of 20):

Forward This Post to Employees To Protect From Hackers

Although there is no guarantee you can be 100% protected against hacking, there are some basics you can share with workers to reduce the chance you will be hit by a cyberbreach such as malware or cryptolocker ransomware. Without further...

How Microsoft Just Scared the IT Community to Death

Brad Smith, the President and Chief Legal Officer at Microsoft spoke recently at a conference and wrote about the need for a Digital Geneva Convention which would do a number of things. For example, it would eliminate targeting of tech companies, assist...

Methbot: These ARE the Russian Cybercriminals We're Looking For

We have heard that Russian hacking caused Hillary Clinton the election for the last few weeks. But some surmise that pushing this narrative was done expressly to sway electors. Now that the vote is behind us - perhaps the Russian...

The Utter Hypocrisy of Feigned Russian Hacker Outrage

From the president to the mainstream media, all of a sudden it seems state-sponsored hacking is a problem Whether you believe Barack Obama’s presidency was a failure or a success, there is no doubt on the subject of cybercrime, this...

Ransomware Fog Rolls over SanFran Muni, SFMTA

We’ve known ransomware costs for a small- to medium-sized business can be $99,000, per Kapersky Labs. This includes lost business data, productivity and perhaps trade secrets or proprietary information, as well as increased spending on IT security. A new...

Yahoo! Cybersecurity Breach Helps Lower Value by $1 Billion

If you need a wake up call on how much a cybersecurity breach will cost, take a look at Yahoo who may have just lost $1 billion dollars in their sale to Verizon. In addition, Yahoo! was outed - although...

Cybersecurity and the Terrible, Horrible, No Good, Very Bad Week

There are perhaps four major cybersecurity incidents in my mind which are world-changing. The first is the OPM data breach which allowed China to get the most intimate secrets of virtually all federal employees – tens of millions of them....

You Can Get Fired for Choosing Dropbox: A True Story

An MSP is contacted by a publicly traded company looking for help managing their IT. When the MSP goes to the company conference room to tell them about how they can protect their servers, the decision-maker explains they don’t have...

President Obama, After $400 Million, Where are Those Criminal Iranian Hackers ?

Why did we ship a fortune to our mortal enemy and not get the indicted cybercriminals living in Iran who attacked us, in return? The U.S. is in a cyberwar. It's common knowledge. If you did have a doubt, it...

The New Threat: Drones Attacking Industrial Systems

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior...

API of the Week: Trulioo Provides Instant Identity Verification

As hackers have become more successful, they have become emboldened and are able to attack companies via ransomware and malware as well as individuals via password theft. As ever-increasing amounts of crucial information are available electronically, the challenge then is...

The Opportunities of the Dark Web

What I learned from the first-ever dark web event. Yesterday, we held the world’s first Dark Web conference called Inside Dark Web – with partners Bob Miko and Alan Meckler. When we first decided to launch the event we discussed...

Inside Dark Web Live Blog 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the...

Inside Dark Web Conference: Why TMC Teamed with Alan Meckler

  Alan Meckler is one of the brightest visionaries in the tech world having launched the first show covering the Internet in the 1990s – Internet World, part of Mecklermedia. He was underestimated and denigrated by virtually all the traditional...

Politically Motivated Hackers Hit Nissan, Are You Prepared?

Quite often when we think about hackers, we imagine there is someone looking to gain something of value from us. In response, we plan our computer and network security strategy with this in mind. For example, many attacks have targeted...

My Thoughts on the Iran Dam Hacking in Rye, NY

Today, I discuss the ongoing cyberwar which the US is unprepared for. Specifically, as it relates to the American citizens who will be targeted. Consider, as Iran and other countries literally declare electronic war on us, we respond by freeing...

News from Jabra, Nimble, Polycom and More

At the most recent ITEXPO Anaheim last month, TMC had the opportunity to interview many of the leading companies in technology in telecom. In addition to videos we shot and countless briefings, our editorial team has been hard at work writing...

VoicePIN Voice Biometrics Brings New Tech to Phone and Apps

The biometrics market has been around for decades but never achieved widespread acceptance until after Apple rolled out TouchID. Laptop makers flirted with the technology about a decade ago but never got their systems to work very well. Apple...

Clinton's BYOD Phones, E-mail Server May Achieve Bin Laden's Goal

One of Osama Bin Laden’s goals was to assassinate president Obama in order to get Joe Biden promoted to president. Said Bin Laden: Obama is the head of infidelity and killing him automatically will make [Vice President] Biden take over...

CyberFlow Analytics Detects Cybersecurity Breach Anomalies

Security experts agree – there is absolutely no way to ensure your network is 100% safe from cybercriminals – if they really want to get in, they will. All you can do is put as many layers down in front...
Featured Events