Unified Communications: Click to talk:

compromise

1

December 1, 2009  4:45 AM

Check Point Integrates FaceTime Web 2.0 Security



Posted by: Tony Bradley
Check Point, compromise, data leak, facetime, Security, Social networking, Web 2.0

Web 2.0 tools and social networking services offer an increasing challenge for IT and security administrators tasked with balancing the productive flow of communications in real-time with the security risks of leaked and compromised data. Check Point, a leader in network security appliances, has...

November 14, 2007  5:32 AM

XSS Vulnerability Plagues VoIP



Posted by: Tony Bradley
compromise, IP communications, Linksys, Security, SIP, Unified Communications, VoIP

Voice over IP, or VoIP, communication is still relatively new. Being a bleeding edge technology has its pros and cons when it comes to security. On the down side, developers are in such a hurry to be the first to market, and they want to maximize performance, so security is not a priority. On the...


September 27, 2007  7:28 PM

Survey Paints Bleak Outlook for Mobile Network Security



Posted by: Tony Bradley
compromise, Data breach, Mobile, Mobile device, Portable storage, Security

It seems like security breaches and data compromise are almost a daily occurrence now. From the stolen VA laptop, to the massive breach of customer trust and network security at


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: