Ah yes, ‘tis the season. Wherever you go, you’ll run into bell ringers, stores decorated way too early, and predictions of IT trends. We don’t make predictions, but we do look back at IT innovations of the year. Think of it as a progress report, a good way to get grounded and neutralize the pain of security breaches and loss of net neutrality.
Firewalls—they’re pretty boring, right? How many times have you yawned at the mention of these essential but unexciting devices? That might have been true in the past. But, did you know that even next-gen firewalls are subject to hype and might be on the road to extinction?
Welcome to another foray into VoIP-related technology and the hype that surrounds it. This time, we’re reviewing end-to-end encryption of phone calls, messages, video and audio VoIP content—what encryption is, how it works and who needs it.
Does your business want to set up or improve its threat intelligence security operations? If you find it more complicated that you thought, you have plenty of company. Many companies wanting to benefit from TI are learning a hard truth: setting up successful TI operations takes a lot more than subscribing to a TI service and running data feeds through a TI platform. So, what’s in the “fine print” of setting up successful TI operations?
Some things never change.
We Stop to Take a Breath: Getting Real with VoIP
You don’t have to go far to collide with breathless prose describing the expected capabilities of VoIP technologies and tools. The hype machine is at it again. Internet telephony has become the next shiny new thing.