Search
Close this search box.

Firewalls: Traditional, Next-Gen and Never Again

VoIP Firewall Security

Firewalls—they’re pretty boring, right? How many times have you yawned at the mention of these essential but unexciting devices? That might have been true in the past. But, did you know that even next-gen firewalls are subject to hype and might be on the road to extinction? Hackers, Firewalls and AI For many IT admins and developers, […]

Cracking the Code of VoIP Encryption

Encryption for VoIP

Welcome to another foray into VoIP-related technology and the hype that surrounds it. This time, we’re reviewing end-to-end encryption of phone calls, messages, video and audio VoIP content—what encryption is, how it works and who needs it. Different Levels of VoIP Security VoIP communications (phone calls, video and messaging) are being widely adopted to provide […]

Some TI Requirements You Might Have Overlooked

Threat Intelligence

Threat Intelligence and Security Does your business want to set up or improve its threat intelligence security operations? If you find it more complicated than you thought, you have plenty of company. Many companies wanting to benefit from Threat Intelligence are learning a hard truth: setting up successful TI operations takes a lot more than subscribing […]

Compelling Voice over IP Statistics to Build Your Business Case

Business VoIP

Business VoIP Statistics You’ve probably heard plenty of anecdotes about the benefits of Voice over IP, and you know that many organizations have already made the switch. But if you’re thinking about upgrading from a traditional phone system to Business VoIP, then anecdotes are not enough – you need cold, hard facts to build your […]

8 Ways to Avoid Threat Intelligence Disappointment

Cyber security

More than 35 years ago, when biotech was young, the trade press bombarded readers with a litany of praise about the newest biological drugs, processes and medical treatments that biotech would bring to pass. As usual with high-tech product announcements, some of this verbiage was based on hope, not evidence. Long before Gartner established its […]