Unified Communications: Click to talk:

Security


December 11, 2007  2:21 PM

Cisco Confirms VoIP Security Hole



Posted by: Tony Bradley
Cisco, Hackers, IP communications, VoIP

VoIP is the new wireless (unfortunately, wireless is still the new wireless as well). By that, I mean it is the hot new technology that everyone is implementing even though they don't really know how to properly deploy it and they have even less knowledge of how to secure it. Vendors are guilty...

December 5, 2007  2:41 PM

Next-Generation IPS From Cisco



Posted by: Tony Bradley
Cisco, Gigabit ethernet, Intrusion prevention, IPS, Networking

For organizations that have high-volume networks, such as networks that are used to stream audio or video, or networks that are used to process large quantities of transactions, monitoring can be a problem. The functionality of the network, and the security of the network, are in conflict. From a...


November 30, 2007  5:44 PM

Projected Network Infrastructure Spending For 2008



Posted by: Tony Bradley
Ethernet, IP, IP communications, Network Access Control, Networking, UCC, Unified Communications, VLAN, VoIP, wi-fi, Wireless

What are your plans for your network infrastructure for 2008? Do you have a holiday wish list or some New Year's resolutions regarding the technologies you want to implement or the changes you plan to make? TechTarget's SearchNetworking site conducted a survey of over 1,200 respondents and they...


November 29, 2007  2:17 PM

LAN Security: What Hackers Don’t Want You To Know



Posted by: Tony Bradley
ARP Poisoning, Ethernet, Hackers, LAN, Networking, Security, Switches, VLAN

This blog is titled "Connectivity" because it deals with all aspects and issues of network connectivity. That includes how to ensure your network connectivity is secure and available, and how to make sure that malicious attackers can not intercept or disrupt your network connectivity. Do you know...


November 14, 2007  5:32 AM

XSS Vulnerability Plagues VoIP



Posted by: Tony Bradley
compromise, IP communications, Linksys, Security, SIP, Unified Communications, VoIP

Voice over IP, or VoIP, communication is still relatively new. Being a bleeding edge technology has its pros and cons when it comes to security. On the down side, developers are in such a hurry to be the first to market, and they want to maximize performance, so security is not a priority. On the...


October 11, 2007  4:55 PM

Unified Threat Management



Posted by: Tony Bradley
antimalware, IP communications, Networking, Security, Unified Threat Management, UTM, VoIP

It seems that the world of information technology and information security is pursuing a path to harmony and cooperation. The current buzz word is "unity". We have unified communications- converging IP networking, email, voicemail, voice communications, and instant messaging to provide an...


October 11, 2007  4:09 PM

Compliance Impact on Intrusion Detection



Posted by: Tony Bradley
Compliance, Fisma, HIPAA, PCI DSS, Security, SOX Anton Chuvakin

Intrusion detection, despite being declared dead by a Gartner analyst in 2003, remains alive and kicking in 2007...almost 2008. Actually, not only is it still around and being used in various forms by many organizations,...


October 4, 2007  12:41 PM

Network Security With ACL’s



Posted by: Tony Bradley
ACL, Cisco, IP, Networking, Security

One of the main components of networking is the router. Without the "router", the traffic would not be "routed" to its intended destination (duh!). That also means that the router is in a prime position to act as a gatekeeper to help protect the network. By defining and implementing Access Controls...


September 27, 2007  7:28 PM

Survey Paints Bleak Outlook for Mobile Network Security



Posted by: Tony Bradley
compromise, Data breach, Mobile, Mobile device, Portable storage, Security

It seems like security breaches and data compromise are almost a daily occurrence now. From the stolen VA laptop, to the massive breach of customer trust and network security at


September 18, 2007  1:12 PM

Is The Perimeter Dead?



Posted by: Tony Bradley
BlackBerry, Mobile, Networking, Security, Securitychannel, wi-fi, Wireless

When it comes to network security, the perimeter has traditionally been the primary defense. Organizations have invested a significant amount of time, money and resources into firewalls and other perimeter security technologies aimed at keeping unauthorized network traffic outside and sensitive...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: