security

November 15, 2018 BLog List Date Underline

Four Things You Need to Know About TLS 1.3

by Gernot Scheichl

TLS 1.3 launched in August 2018. At that time, it had been eight years since the last time TLS updated. A lot of things have happened in eight years – smartphones became the norm rather than the exception, the cloud gained primacy, and high-speed mobile and wired internet blanketed increasingly large swathes of the globe. While these changes have made things easier for consumers, they’ve also made it easier for attackers to spy on their connections and steal their data. In other words, an update to TLS has been more than overdue.

See More > >
October 17, 2018 BLog List Date Underline

SD-WAN vs. Next-Generation Firewalls: Which Should Come First?

by Chris Kolstad

SD-WAN has been poised to offer significant opportunities to enterprises for some time now. But one of the concerns with SD-WAN is network security, especially considering the multiple parts in the architecture involved with this network.

See More > >
October 09, 2018 BLog List Date Underline

Know Your Enemy: Four Types of VoIP Hackers

by Gernot Scheichl

With so many high profile data breaches making the headlines, it’s easy to forget that IP Communications systems are routinely targeted for attack. While it may be clear what the criminals were looking for when they stole credit card data or government employee data, it may not be as obvious as to why hackers are trying to break into your private communications systems. The first step to ensuring VoIP service security is knowing your enemy. So the question remains—what’s in it for different kinds of VoIP hackers?

See More > >
August 07, 2018 BLog List Date Underline

The Jury's Out on SD-WAN Security

by Chris Kolstad

If you’ve ever come across a one question survey, did you feel compelled to quickly click through to reveal if your answer was among the masses? That’s what happened with a Light Reading survey asking, “Are SD-WAN Services Secure?”

See More > >
June 07, 2018 BLog List Date Underline

CDN: Good for DDoS, Bad for Malware?

by Gernot Scheichl

Bundling VoIP, SMS, instant messaging, and other communications methods can be a real drag on bandwidth. To optimize, many Unified Communications (UC) providers are partnering with Content Delivery Network (CDNs) to improve response times, provide traffic management, and high availability among other benefits.

See More > >
June 05, 2018 BLog List Date Underline

Google’s Android Things – A Step in the Right Direction

by Gernot Scheichl

Android Things is a connected-device framework and an IoT development platform (with built-in IoT security). It was announced by Google in December 2016 as a developer preview version for IoT and embedded devices, and officially launched as version 1.0 at their recent May 8th annual developer conference.

See More > >
blog-ctabar-img.png

SIP Trunking Survey: Many Don't Have any SBCs