dcsimg

Articles by Ari Takanen 

Fuzzing: Avoid Zero-Day Attacks -- Build Security In, Don't Add it!

The greatest security challenge today is discovering new vulnerabilities. Software release cycles are getting faster and new technologies are increasingly complex, a perfect breeding ground for bugs.

Securing VoIP Networks, Part 1

In this book excerpt, the authors describe how to handle firewalls, NAT, and Session Border Controllers.

Get the Latest Scoop with Enterprise Networking Planet Newsletter

By submitting your information, you agree that enterprisenetworkingplanet.com may send you ENTERPRISENetworkingPLANET offers via email, phone and text message, as well as email offers about other products and services that ENTERPRISENetworkingPLANET believes may be of interest to you. ENTERPRISENetworkingPLANET will process your information in accordance with the Quinstreet Privacy Policy.