3 Articles Tagged hacking

Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Avaya Article Thumbnail

How to Fail a Hacking Challenge

  • Maan Al-Shakarchi
  • July 20, 2016 | 2 minutes to read
  • 32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security…
Avaya Article Thumbnail

Hacking 911: Is the Genie out of the Bottle?

  • Mark J. Fletcher, ENP
  • August 25, 2014 | 3 minutes to read
  • For many years a level of frailty has existed in the nation's 911 network and its primary level of protection has been "security through obscurity".…