Peter : On Rad's Radar?
Peter
| Peter Radizeski of RAD-INFO, Inc. talking telecom, Cloud, VoIP, CLEC, and The Channel.

security tag

Drill down on security search:

25 result(s) displayed for security (26 - 50 of 53):

Duopoly Now Offering Home Automation and Security

Comcast, Bright House Networks, Cox, TWC, Verizon and now AT&T are offering home automation and security service. BHN and VZ are competing in the Tampa Bay market for all consumer services - voice, TV, broadband and now security."Bright House Networks'...

Dell Gets WYSE

Dell announced that it is acquiring WYSE today. WYSE is known for its dummy terminals, particularly for POS (point-of-sale). WYSE also has gotten into desktop virtualization - not that strong a leap. Wyse has shipped more than 20 million units...

The Scoop on TDMobility

I spoke with Brian Kosoy, PR manager for Tech Data, and Charles Kriete, the Executive Vice President of TDMobility. Kriete is also the founder of the company that developed some of the key technology (CellManage) in TDMobility. His company was...

iPad, MDM and Other News

Bandwidth.com bought DASH Carrier Services and renamed it inetwork. Apparently, inetwork is doing gangbusters in the wholesale VoIP space, the largest arbitrage space left, I would imagine. It's the new LD.  inetwork offers origination, termination, e-911, SMS and toll-free. The...

What Else Are You Going to Sell?

TDM is running out of runway. Agents have already switched to selling Ethernet, MPLS and SIP Trunking. What else can they be selling? Back-up, like Conferencing, is a cash cow that Agents just don't sell. From archiving email per federal...

A Brief View of Integra Telecom

I interviewed Integra in Austin last year. Like quite a few interviews I do, I just can't find the time to write up the blog. It may seem like I do this blogging thing full time, but my bills...

Privacy versus Security

“Concerned about privacy? Maybe you should be concerned about the economy instead. That was the subtext of a keynote speech by Sheryl Sandberg, Facebook’s chief operating officer, at a technology conference in the heart of Europe.” [Benton] Not to get...

FCC's Small Biz Cyber Planner

There is a whole lot of truth to this statement from the FCC: "American small businesses are key drivers of innovation, economic growth and job creation. Small businesses employ more than HALF of all private sector workers, and they have...

Data Centers Make the Big Time

When USA Today starts talking about data centers, the sector has hit the big time. The USA today ran a piece about the secret rooms that run the Internet. You'd think they were talking about the NSA rooms that read...

VoIP Security Best Practices

There has been much talk lately about VoIP security.The FCC has a page to warn consumers and businesses alike about Voicemail hacks. (The FCC calls it Voice Mail Fraud but it’s really about hacking the voicemail system to enable toll...

Security VoIP and Otherwise

There are certainly security risks with VoIP. (And we will get to that). But let us not forget that TDM voice is easy to hack too. A pair of alligator clips and people can dial from your line or listen...

Expectations in 2011 with Jon Arnold

Jon Arnold joins me for a chat about what to expect in 2011. We touch on Acme Packet, SBC, security, outages, IPv4, Cloud and Social CRM. It's a full 25 minutes....

I Cannot Keep Up. CBEY Maxes Cloud

Cbeyond, Inc. (NASDAQ: CBEY), a leading provider of IT and communications services to 55,000 small businesses across the country, today announced that it has acquired the assets of privately held MaximumASP and its affiliated companies, as well as the outstanding...

More Mergers

Windstream bought Q-Comm this week. Q-Comm owns Norlight and KDL for $782M - cash, stock and debt. Windstream gets 30,000 fiber route miles (whatever the heck that is). It also acquires about 5500 SMB customers to complement what it bought...

Another Digital Security Risk

Who knew that copiers were such a digital security risk? ...

This is not a Phone Booth

This is not a phone booth. It's a car. Try driving without using your cell phone....

Chatting with Jon Arnold

I enjoy talking telecom, especially with other smart people in the Industry. Here are two short conversations with Industry Analyst, Jon Arnold. Jon Arnold discusses Cyber Security, but more specifically on Jon's take on the Shadow Network that he wrote about....

PCI Compliance in the Cloud

On this blog, the author posts a reply from Amazon about the level of PCI Security of EC2 and Amazone Web Services. As for PCI level 2 compliance, that requires external scanning via a 3rd party, PCI-approved vendor. It is possible...

Start-up Venture Capital

I'm getting ready to run downstairs to the Florida Venture Forum 2009 Early Stage Venture Capital Conference outside Orlando at Omni ChampionsGate. Beautiful golf course.  It will be interesting to see who is here. I am hoping 2 companies made...

CIO's Top Tech Investments

Robert Half interviewed 1400 CIO's for a research study (press release here), It's not a surprising list: Security, VOIP, Virtualization, SAAS, and data center efficiency. Considering power costs much more than space, getting energy and hardware efficient means cost savings....

Why Security Will Be Priority 1

As I skim the Verizon Business 2009 Data Breach Investigations Report (PDF) to find that "295 million records were compromised and there were 90 confirmed breaches last year", I think where is the security? The Intrusion Detection Systems, the firewalls,...

7 Steps to Better SIP Security on Asterisk by JT

John Todd is an Asterisk evangelist and works for Digium. VoIP Users Conference reposted John's 7 steps to better SIP Security on Asterik (here). The reason for the 7 steps now? "In the last few months, a number of new...

IT Folks Chatting About Communications

During a discussion online, some interesting items popped up.Companies ban Instant Message. One IT Security Consultant looks at the irony of it here. Tele-Presence is all about improved efficiency in communicating -- no more phone tag, less voicemail, that kind...

Do You Work on Encrypted VoIP?

I am on Peter Shankman's HARO list. This morning there is a UK reporter from Future Intelligence looking for anyone working on Encrypted VoIP in Europe. (Deadline is 9/15). The Editor, Peter Warren, is looking for: "I am looking for...

SPIT and Vomit

We had the huge DNS security hole a couple of weeks ago. Now we have the BGP security flaw. What next?Well, according to a presentation by VOIPSA, there are threats out there to target SIP. BTW, VOIPSA is the VoIP...
Featured Events