Category Security

Communications Security: Covering the Bases

If you are responsible for managing a communications systems and you aren’t thinking about security, you aren’t thinking. In my latest article for No Jitter, I write about a number of security concerns and offer up a few ideas on how to address them. Communications Security: Covering the Bases Advertisements

A Toll Fraud Primer

I’ve written a number of articles about the how to create a secure SIP infrastructure, but I haven’t really spent much time on what happens if you don’t.  There are lots of nasty people out there who are determined to steal money or information from anyone foolish enough to leave the doors to their business […]

Comprehensive, End-to-End SIP Security

I was out east last week (I grew up in Arizona and we call everything on the right side of the map “out east”) where I worked with a large university and hospital on their move to SIP. They aren’t starting from scratch and have implemented some SIP, but for the most part they are […]

The Death of the VPN

A lot has changed since I left college and entered the workforce.  My first “real” job began July 5, 1983 at the company formerly known as Northern Telecom.  My first desk telephone was an analog 2500 set.  I did most of my work on a green CRT (Cathode Ray Tube) screen logged into a PDP-11 […]

Converge2014: Building a Secure SIP Network

For the most part, I love my job.  I love sifting through Wireshark traces trying to find needles in SIP haystacks.  I get excited learning about new IP communications products.  My heart practically skips a beat when I read about another SIP service climbing out of its physical shell and going virtual. However, the best […]

Understanding Transport Layer Security (TLS)

Over the course of several blog articles I’ve mentioned some of the security aspects of SIP.  In Proving it with SIP Authentication I discussed the use of response messages and authentication headers.  That kind of security is delivered at the protocol level.  In other words, SIP clients and servers exchange messages that enforce identity-level security.    […]

Proving it with SIP Authentication

My name is Andrew Prokop and I live in Saint Paul, Minnesota.  I have brown hair and green eyes.  I grew up in Arizona and still think of the Sonoran desert as my second home. I could go on and on with these so-called “facts” about me, but how do you know what’s true and […]

Practicing Safe SIP

Remember the days when denial of service referred to “no shoes, no service,” a virus was a nasty cold, and security meant you locked your doors at night?  Sadly, those days are long gone and unless we are prepared to give up Internet technologies and return to the dark days of CompuServe and analog telephones, […]

SIP Adaptation

The trouble with standards is that they rarely are.  Standard, that is.  It seems that no matter what sort of technology you are dealing with, there are plenty of variations.   In America a wall socket delivers electricity at 120 volts, 60 Hz.  In England they use 230 volts, 50 Hz while in Mexico they’ve “standardized” […]

Choosing the Right SBC — It All Depends

I am often asked the question, “What’s the best Session Border Controller?”  To me, that is like asking, “What’s the best place to vacation?”  It all depends on what you’re looking for.  Do you want to lie on the sand on some tropical beach or is skiing down a mountain slope your idea of a […]