Tag Archives: Security

SIP Certificates for Avaya Endpoints

As busy as I am these days, I have a hard time saying “no” when asked to write something for what I deem to be a worthy publication.  Case in point is the article on SIP Certificates that I wrote for IAUG Insights.  “Flip” to page 22 to find me. IAUG Insights  

SIP: Looking Behind the Curtain

Are you coming to Enterprise Connect in March?  If so, here are a few reasons why you want/need to attend my ever-popular SIP session. SIP:  Looking Behind the Curtain

How Vulnerable is Your SIP

“If you have built castles in the air, your work need not be lost; that is where they should be. Now put the foundations under them.” ― Henry David Thoreau I don’t like to think of myself as old, but there are times when I feel absolutely ancient.  This is especially true when it comes […]

SIPVicious: Anarchy in the UC

Undermine their pompous authority, reject their moral standards, make anarchy and disorder your trademarks. Cause as much chaos and disruption as possible, but don’t let them take you alive! — Sid Vicious My latest article for No Jitter addresses a topic I’ve spoken about before here on SIP Adventures — security and protection from the […]

Hacking as a Service Part Two: Help is Here

Two weeks ago, I introduced you to a new nemesis in Hacking as a Service Part One: The Evolution of the Bad Guy. The ways that people can do you harm has intensified and the tools they employ to carry out their dirty work are far more sophisticated than the ILOVEYOU worm that wreaked havoc […]

Hacking as a Service Part One: The Evolution of the Bad Guy

Despite the fact that I consider myself to be a peaceful and reasonably honest person, I adore movies about organized crime and extremely nasty people. Whether it’s Edward G. Robinson playing Rico in the 1931 classic, “Little Caesar,” or the more recent Hollywood offerings “American Gangster” and “The Departed,” there is something about bad guys […]

IoT: A Cause for Celebration and Precaution

Are you familiar with the Carna Botnet? If not, you really should be. Back in 2012, an anonymous hacker set out to “measure” the Internet in a survey entitled The Internet Census of 2012.   Enlisting the Nmap Scripting Engine, every publicly addressable IP address was scanned with the goal of finding just what was out […]

Mocana — Securing the App

I am not the kind of person who writes something simply to be controversial. While I have written a few articles for No Jitter that have caused some people to challenge my thoughts and opinions, I don’t write them with the sole purpose of raising a ruckus. I write them because I truly believe in […]

Nine Good Reasons to Own a Session Border Controller

SIP has been around since the late 1990’s, but confusion still exists about what it exactly is and what it can do. Most telephony people understand that SIP changes the way we make voice and video calls, but their understanding is often sketchy. The confusion surrounding SIP is often greatest when it comes to the […]

SIP Security at Converge2015

When you think about security in terms of SIP and VoIP, you need to consider four different areas.  First, you want to protect the SIP signaling.  Second, you need to protect the media stream.  Third, you need to ensure that people are who they say they are.  Lastly, you need to create a secure network […]