4 Articles Tagged hacking

Avaya Article Thumbnail

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | Estimated reading time: 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Avaya Article Thumbnail

How to Fail a Hacking Challenge

  • Maan Al-Shakarchi
  • July 20, 2016 | Estimated reading time: 2 minutes to read
  • 32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security…
Avaya Article Thumbnail

Hacking 911: Is the Genie out of the Bottle?

  • Mark J. Fletcher, ENP
  • August 25, 2014 | Estimated reading time: 3 minutes to read
  • For many years a level of frailty has existed in the nation's 911 network and its primary level of protection has been "security through obscurity".…