Tag Archives: SBC

VoIP Security in a Time of War

“You cannot choose your battlefield,God does that for you;But you can plant a standardWhere a standard never flew” Nathalia Crane Just when the stress of the pandemic was starting to ease and it looked as if the world might return to some sense of normal, we suddenly find ourselves on the cusp of World War […]

Best Practices for SIP and UC Security

I had the honor of being asked to present three breakout sessions at the Avaya Engage virtual conference.  While I prefer presenting in front of a live audience, COVID has taught me that flexibility is paramount. Although this wasn’t the smoothest performance of the three (I got better with each recording), I am very pleased […]

The Four Pillars of Communications Security

I have been working with IP technology for a long time. I can’t tell you the exact year of my first exposure, but it was sometime between 1985 and 1987. I was working at Northern Telecom as a software developer and was tasked with adding a TCP/IP stack to a version of Unix that ran on a Motorola […]

Deploying VoIP Security the NSA Way

In my latest guest blog post for Assertion, I take a look at the NSA guidelines for securing VoIP and UC.  I learned a few new tricks and expect that you will, too.  Take a look at let me know what you think about it. Deploying VoIP the NSA Way

How Vulnerable is Your VoIP?

In my latest guest article for Assertion I ask How Vulnerable is Your VoIP? It’s worth a look if only for a photograph of an 18-year-old me.

Securing Your SBC the Assertion Way

I live in a gated community, but I still lock my doors. My LinkedIn connections may have noticed that I list two current jobs.  My day job is Client Experience Innovations at Avaya.  That’s a fancy way of saying that I am paid to dream up and prototype new ways for people to connect and […]

Why Do You Need a Session Border Controller

SIP has been around since the late 1990’s, but confusion still exists regarding what it is and what it can do.  Most old school telephony people realize that it changes the way we make voice and video calls, but after that their understanding is sketchy. The bewilderment surrounding SIP is often greatest when it comes […]

Planning a Successful SIP Trunk Migration

I keep getting asked to guest blog post about SIP and I just can’t seem to say “no.”  If you are planning a SIP migration or want to tune your existing configuration, this is the article for you. Planning a Successful SIP Trunk Migration

Thinking Holistically about SIP Security

Every so often I am asked to write an article for a blog other than my own.  I usually respond with “no.”  There are only so many hours in the day and those few are already over-scheduled without taking on additional work.  However, I said “yes” to this one.  After all these years, I still […]

Attention, Vigilance: Securing Your SBC the Right Way

I finished my third and final (for now) No Jitter article about SIP security.  This time I take a look at what should be done at the SBC.  If you are serious about security, and you should be, please take a look. Attention, Vigilance:  Securing Your SBC the Right Way