Firewalls—they’re pretty boring, right? How many times have you yawned at the mention of these essential but unexciting devices? That might have been true in the past. But, did you know that even next-gen firewalls are subject to hype and might be on the road to extinction?
Welcome to another foray into VoIP-related technology and the hype that surrounds it. This time, we’re reviewing end-to-end encryption of phone calls, messages, video and audio VoIP content—what encryption is, how it works and who needs it.
Does your business want to set up or improve its threat intelligence security operations? If you find it more complicated that you thought, you have plenty of company. Many companies wanting to benefit from TI are learning a hard truth: setting up successful TI operations takes a lot more than subscribing to a TI service and running data feeds through a TI platform. So, what’s in the “fine print” of setting up successful TI operations?
Some things never change.