8 Articles Tagged hacking

Avaya Article Thumbnail

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?

  • Ed Koehler
  • February 15, 2017 | Estimated reading time: 4 minutes to read
  • Here in part four of my APT series, we’re looking at how to detect Advanced Persistent Threats in your network. The key is to know…
Avaya Article Thumbnail

APTs Part 3: Prevention is Ideal, But Detection is a Must

  • Ed Koehler
  • February 8, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I spoke about the first steps in the kill chain. Now that the Advanced Persistent Threat (APT) has gained residence, it’s…
Avaya Article Thumbnail

APTs Part 2: How the Advanced Persistent Threat Works

  • Ed Koehler
  • February 1, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I introduced the concept of Advanced Persistent Threats (APT) and provided some background on what these groups are about. APTs want…
Avaya Article Thumbnail

APTs Part 1: Protection Against Advanced Persistent Threats to Your Data

  • Ed Koehler
  • January 10, 2017 | Estimated reading time: 4 minutes to read
  • Hardly a day goes by without hearing about a data breach somewhere in the world. So it’s timely that we launch this new blog series…
Avaya Article Thumbnail

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | Estimated reading time: 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Avaya Article Thumbnail

How to Fail a Hacking Challenge

  • Maan Al-Shakarchi
  • July 20, 2016 | Estimated reading time: 2 minutes to read
  • 32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security…
Avaya Article Thumbnail

Hacking 911: Is the Genie out of the Bottle?

  • Mark J. Fletcher, ENP
  • August 25, 2014 | Estimated reading time: 3 minutes to read
  • For many years a level of frailty has existed in the nation's 911 network and its primary level of protection has been "security through obscurity".…