Thursday, March 15, 2007

Plentiful VoIP exploits demand careful consideration

Enterprise VoIP vendors may tout "plug-and-play" products that are ready to run right out of the box, but those vendors may not be taking security into consideration. As information security threats expert Ed Skoudis writes, there are many potential VoIP threat vectors, but packet-based telephony services can be secured with due diligence and adherence to best practices.

Comments: Post a Comment



<< Home

This page is powered by Blogger. Isn't yours?