Rich Tehrani : Communications and Technology Blog - Tehrani.com
Rich Tehrani
CEO
| Communications and Technology Blog - Latest news in IP communications, telecom, VoIP, call center & CRM space

security tag

Drill down on security search:

25 result(s) displayed for security (1 - 25 of 178):

Yahoo! Cybersecurity Breach Helps Lower Value by $1 Billion

If you need a wake up call on how much a cybersecurity breach will cost, take a look at Yahoo who may have just lost $1 billion dollars in their sale to Verizon. In addition, Yahoo! was outed - although...

Is Yahoo the Preferred E-Mail of Terrorists?

Some weird news is coming out about Yahoo! secretly providing the FBI and NSA with information about users who utilize certain phrases in their emails. This would make a lot of sense from a security standpoint but obviously destroys everyone's...

You Can Get Fired for Choosing Dropbox: A True Story

An MSP is contacted by a publicly traded company looking for help managing their IT. When the MSP goes to the company conference room to tell them about how they can protect their servers, the decision-maker explains they don’t have...

The New Threat: Drones Attacking Industrial Systems

We’ve discussed how recreational drones can be used as murder weapons in the past but drones can also be used in ways which businesses and governments should find quite disturbing. At the Black Hat conference in Las Vegas, Yokogawa Senior...

Aricent: How to be Digitally Durable

"APIs are now a business model!""A company that has more APIs has more value."If every industry is being digitally disrupted (it is) then the question companies need to ask is how to remain digitally durable. If you want insight into...

API of the Week: Trulioo Provides Instant Identity Verification

As hackers have become more successful, they have become emboldened and are able to attack companies via ransomware and malware as well as individuals via password theft. As ever-increasing amounts of crucial information are available electronically, the challenge then is...

API of the Week: Vidyo APIs Add Value All Around Us

If you want your company to have a tremendous valuation, make it an integral part of a platform which allows others to benefit financially from effectively selling your products and services. Tens of thousands of resellers promote Microsoft software, hundreds...

Inside Dark Web Live Blog 2016

I will be live-blogging all about the latest dark web happenings from the show starting tomorrow. Gordon G. Chang, the author of Nuclear Showdown: North Korea Takes On the World as well as other works is about to take the...

Masergy's People-Directory Vision Has Potential

Dean Manzoori describes Masergy as a technology company which own and manages the world’s largest global private network providing cloud network, managed security and UC as a service. To ensure the highest level of quality, their UC platform is embedded...

Inside Dark Web Conference: Why TMC Teamed with Alan Meckler

  Alan Meckler is one of the brightest visionaries in the tech world having launched the first show covering the Internet in the 1990s – Internet World, part of Mecklermedia. He was underestimated and denigrated by virtually all the traditional...

State of the IoT Market: Kore, Polaris, Cradlepoint

Cradlepoint talks scaling IoT at IoT Evolution ExpoAt the most recent IoT Evolution Expo in Fort Lauderdale, Florida, we had a chance to interview a number of the companies shaping the future of the IoT space. Cradlepoint (below) for example...

Politically Motivated Hackers Hit Nissan, Are You Prepared?

Quite often when we think about hackers, we imagine there is someone looking to gain something of value from us. In response, we plan our computer and network security strategy with this in mind. For example, many attacks have targeted...

Lasers are the Future of Drone Fighting

I’ve been among the first people to realize how drones can be a major problem for security in the world. In February 2014, in fact, I said there was a coming urban drone war and since then, drones with guns...

CyberFlow Analytics Detects Cybersecurity Breach Anomalies

Security experts agree – there is absolutely no way to ensure your network is 100% safe from cybercriminals – if they really want to get in, they will. All you can do is put as many layers down in front...

SDN and Micro-Segmentation boost Security for BYOD According to AirWatch/VMware

The proliferation of mobile devices and cloud services has caused a geometric increase in security threat possibilities as each device type and OS version can potentially be vulnerable. In addition, these devices need access to more and more cloud information...

The Drone War Hits the White House

A man was just detained outside the White House for trying to fly a drone over the fence. It is too soon to know the intentions of the flyer but this is something I have warned about for some time....

CloudGenix Gets Funded to Fuel SD-WANs

Kumar Ramachandran, Co-Founder and CEO of CloudGenix recently sat with me and explained his vision for software-defined enterprise WANS, which use off-the-shelf hardware and allow corporations to abstract their business processes, utilize hybrid network virtualization and network function projection. SD‐WANs...

Expect Security Funding Bubble to Pop in 3-5 Years

Security is one of the hottest areas in tech right now. Indeed, there is infinite possibility in this space because technology inherently has weaknesses and malicious actors seem to always be a step ahead of users and software companies....

SimpleWAN Well Positioned for Security-as-a-Service Growth

The state of IT security is terrible - that is the only conclusion you can make when breach after breach is reported in the news. Keep in mind these are the breaches we hear about... Countless others go unreported. Hackers...

Citrix Boosts Mobile Solutions to Carriers, Enterprise

Citrix was showing off a lot of interesting solutions at MWC 2015, starting with the MPX 25000, a device which provides ADC functionality for carriers utilizing an NFV approach of using OTS hardware instead of customized solutions. The company tells...

Why Cradlepoint is Poised for Growth

We all know the M2M and IoT spaces are growing like crazy... Our own growing M2M Evolution and IoT Evolution shows are just a few examples of how the marketplaces are on fire as a seamlessly never-ending flow of new...

How Sony May be Fighting to Unleak its Information

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent or actors has been released. In just one incident a director called Angelina Jolie a spoiled, untalented, egomaniacal...

You need a Flip Phone for Your Data Center

The big news of the week is celebrities are eschewing smartphones for flip phones. What you ask? Yes, flip phones, those clamshell devices which most people associate with the luddite relative you just saw at Thanksgiving. The reason? They are...

AirHopper: Even Air-Gap Networks are Not Secure

It’s a good time to be in the Cybersecurity business. Quite often, highly secure computers are disconnected from the outside world so as to not get hit by hackers. However, it seems these air-gap networks named for their isolation from...

SOTI Helps Manage the Phones that Save Lives

The enterprise mobility management space is bustling with activity thanks in large-part to the explosion of devices which companies must support. BYOD is something companies had no choice to accept – but this doesn’t mean they can’t manage the devices...
1 2 3 4 5 6 7 8 Next
Featured Events