Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs
Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs Introduction Admittedly, this title is misleading, but it did get you to look at this article! This is part of our series on securing AudioCodes SBCs based on eGroup | Enabling Technologies’ security mantra of “Trust No One, Harden Everything” and guidance provided by AudioCodes. […]
Defuse the Technical Debt Time Bomb
Defuse the Technical Debt Time Bomb While it has certainly been in the news more often lately, technical debt has been a challenge for organizations since the days of vacuum tubes. Other than the recent air travel examples in the last few months, there is a constant stream of articles about health care providers, colocation […]
The Pros and Cons of Threat Hunting
The Pros and Cons of Threat Hunting Assuming Breach Stealthy supply chain attacks like Solorigate and Log4j have shined a light on the importance of assuming breach. When these attacks hit the news, vendors and analysts often suggest to “hunt for Indicators of Compromise.” IT and security pros spend nights and weekends determining the extent […]