Cisco's ‘Application Centric Infrastructure' vs. SDN

Network Protocols and Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • For VoIP, too many threats to count

    At Interop New York, a crew of experts discussed what security challenges VoIP creates and offered some helpful tips. One expert called VoIP technology a "moving target" for attacks. 

  • IP cloaking becoming a business necessity

    Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe. 

  • Don't believe the VoIP security hype

    The VoIP Security Alliance recently created a "Threat Taxonomy" outlining threats, and vendors are flooding the market with security products. What should companies be afraid of? 

  • High-risk flaws in Skype

    Attackers could cause a denial-of-service attack or launch malicious code by exploiting vulnerabilities in the Internet telephony software. But fixes are available. 

  • Group seeks to bolster VoIP security

    An industry coalition has published a lengthy list of guidelines to help identify and deal with threats against Internet voice communications systems. 

  • New Orleans CIO: VoIP, portals and Katrina

    New Orleans CIO Greg Meffert talks with SearchCIO.com about his most harrowing moments after Hurricane Katrina. 

  • McAfee launches bid to clean the cyberplumbing

    The antivirus firm said telecom companies can incorporate McAfee tools into their own service offerings under the Clean Pipes initiative. 

  • Cisco, Intel expand alliance with new wireless offerings

    The companies say their latest collaboration will make wireless networks more secure by giving enterprises greater control over user privileges. 

  • Is it time for a VoIP firewall?

    Some say enterprises may soon need a special firewall to thwart the malicious hackers, spoofers and other threats that can imperil VoIP and other SIP-related communications. 

  • VoIP security, PGP style

    Phil Zimmermann, cryptographer and creator of the popular Pretty Good Privacy (PGP) e-mail encryption program, is addressing what he deems a genuine need for IP voice encryption.

    Zimmermann last week unveiled Zfone, a prototype VoIP encryption a...