Businesses will have to redesign their networks from the ground up if they hope to protect their data from next-generation hackers, according to McAfee president Michael DeCesare. DeCesare said business and high-tech companies will have to use a by-design strategy if they wish to remain ahead of the threats they face. He was speaking during a keynote at the McAfee Focus conference. “We have to figure out how to integrate security into [networks] from the […]
Hackers
Cloud computing offers businesses the opportunity to outsource their IT services, reducing both time and cost efficiently. This is highly attractive, as businesses do not need to understand the devices they are using, but do companies really understand the implications of outsourcing their business services to a cloud computing service? Cloud computing is the next stage in the Internet’s evolution, providing the means through which everything can be delivered as a service, wherever and whenever […]
VoIP-over-VPN technology protects the privacy of corporate voice communications in industrial networks, while delivering the cost-saving and technology benefits of Voice-over-IP. By reducing or eliminating phone charges, consolidating infrastructure, and streamlining network operations and maintenance, Voice over Internet Protocol (VoIP) offers tremendous cost-savings for oil and gas companies and other industrial sectors. As with any new technology, however, there can be a down-side. Most VoIP gateways compromise communication security by transporting VoIP and data traffic […]
Using the OSI network layer model as a basis, here’s how to derive a simplified three-layer model for SIP-based VoIP and corresponding threats and defenses. The resurgence of interest in VoIP to provide telephone services worldwide is often credited to the use of session initiation protocol (SIP) for signaling. Both residential and enterprise VoIP services are widely deployed. IP telephony may be used either to replace the primary telephone service or to provide additional telephone […]
Apple Inc yesterday announced the coming of its cloud based platform, aptly dubbed iCloud. According to news reports, the web service will synchronise and coordinate shared content across all devices – a key element being its ability to stream music; in other words an all-new iTunes. Following its hotly anticipated autumn launch, iCloud has the potential to revolutionise how music is acquired and distributed, offering a service to rival that of Google, Amazon, and Spotify […]
A lack of understanding about security risks is one of the key factors holding back cloud computing. Report after report after report harps on security as the main speed bump slowing the pace of cloud adoption. But what tends to be overlooked, even by cloud advocates, is that overall security threats are changing as organizations move from physical environments to virtual ones and on to cloud-based ones. Viruses, malware and phishing are still concerns, but […]