Lee Sutterfield shares stories and insights from his career as a U.S. Airforce Intelligence Officer battling hackers during the height of the Cold War and in the birth of modern cybersecurity.
PSAPs can be taken out of service by TDoS and DDoS attacks on their infrastructure. DHS is also concerned, and is funding pilot programs to investigate. Dr. Ann Cox from DHS, Chuck Spaulding from Palm Beach County Florida, and Mark Collier, CTO at SecureLogix discuss what they are doing in a pilot program to understand the issue and potential fixes. Don't miss this MUST LISTEN podcast.
Spoofing is the act of changing the source number on an inbound call. While some spoofing is legitimate, the days of trusting Caller ID are long gone.
An analysis of the Robocall Threat in Voice Network Security
TDoS Attacks flood and overwhelm a target’s voice lines and systems, preventing legitimate calls from getting through.
How to block TDoS Attacks, Toll Fraud, Voice Spam, Social Engineering and other common exploits.
In this report, we discuss the current, real-world state of security in the realms of enterprise Voice and Unified Communications (UC).
CTO Mark Collier talks real-world voice security on "No Jitter," a leading podcast on the converging networking worlds.
A downloadable introduction to the ETM technology platform.
A white paper overview of threats, procedures, and best practices for Enterprise Voice Network Security.
A downloadable brochure explaining the ETM Call Recorder Application.
A downloadable brochure explaining the PolicyGuru Meta-Policy Controller.
A downloadable brochure explaining the ETM Performance Manager Application.
A downloadable white paper explaining Telecom Security and NERC.
A downloadable brochure explaining SecureLogix's Managed Security Service for Voice.
A downloadable brochure explaining the ETM Voice IPS Application.
A downloadable whitepaper explaining SecureLogix's Enterprise Voice Network Security Solutions.
A downloadable whitepaper explaining SecureLogix's Enterprise Telecom Management Solutions.
A downloadable brochure explaining the ETM Usage Manager Application.
A downloadable white paper explaining Guarding Against Call Center Fraud and Attacks.