Security issues in industrial markets have been receiving much attention in the media. The vast majority of devices that power infrastructures offer aging technology in many cases and are not well prepared for the latest cyber security threats. Taking the energy grid as an example: one does not have to be a scientist to find the holes when approximately 70% of the infrastructure is more than 30 years old. Devices that were never designed for […]
security threats
Using the OSI network layer model as a basis, here’s how to derive a simplified three-layer model for SIP-based VoIP and corresponding threats and defenses. The resurgence of interest in VoIP to provide telephone services worldwide is often credited to the use of session initiation protocol (SIP) for signaling. Both residential and enterprise VoIP services are widely deployed. IP telephony may be used either to replace the primary telephone service or to provide additional telephone […]
Cloud computing will play a critical role in helping organisations meet the threefold challenge of an explosion in data, IT budget costs and security threats, according to EMC CEO Joe Tucci. Speaking at EMC World in Las Vegas, Tucci said the hybrid cloud – where companies rely on IT services provided from both the public and private cloud – will provide organisations with “the answer” to these challenges. Tucci illustrated the scale of the difficulties […]