Learn how SIP registration with authentication is performed in the presence of a Session Border Controller. Join ECG for live training to strengthen your SIP knowledge and earn a certificate from ECG.
Authors Mark Lindsey SMTS at ECG
The NIST Cybersecurity Framework is applied to assess and improve security defenses in Civilian government organizations and many enterprises. It can be used as a tool developing your Telecom / VoIP / Voice Fraud defenses.
The SIP Forum is hosting a STIR/SHAKEN Virtual Summit, with presentations from AT&T, Comcast, Metaswitch, TransNexus, Ribbon, and others.
The Microsoft-Metaswitch acquisition had been long in the making. What's behind it? And what does it bode for today's Metaswitch operators?
The FCC's Notice of Proposed Rulemaking gives helpful insight for Service Providers fighting robocalling and implementing SHAKEN/STIR.
How ECG maximizes effectiveness with a widely distributed workforce in a mixture of office and home environments.
At the Cloud Communications Alliance (CCA) Summit in Miami, opinions are strong about the critical features of SD-WAN and its importance for reliable voice and video.
Enterprise Connect 2019 focused on Small-room video systems and Cloud-hosted Contact Center platforms, with lots of other small bits in the orbit.
Cisco's support site now aggressively warns BroadWorks operators when patches are missing.
Seven basic facts about the laws, the logic, and the technical implementation of STIR/SHAKEN to fight robocalling.
New training specials from ECG lock in savings and give you the maximum flexibility for 2019.
To provide reliable SIP failover -- do it slowly.
MIAMI, FLORIDA - BroadSoft Connections 2018 - The US Department of Justice (DOJ) has now allowed ECG to publish information about the long-term relationship in which ECG, Inc. has been proudly supporting Federal law enforcement since 2007. This partnership is one of ECG's proudest contributions to reliable communications for critical, life-saving goals. The US DOJ approved release of the info...
ECGSA-18A: Evidence of Botnet-assisted SIP Attacks exploiting SIP-UA Configuration Files for traffic pumping fraud
Original Release Date: September 19, 2018. Updated 18:19 UTC Systems Affected SIP Service Providers and Enterprises Background & Description SIP based Enterprises and Service Providers (SIP Operators) that provide SIP UA configuration files (such as for Cisco, Polycom, Yealink, Mitel devices), but which do not authenticate those downloads effectively, are vulnerable to attack by...
Network Outages are going to happen. The marketing department talks about Zero Outages -- and that's a great goal to have. But as the pragmatic engineering and operations team, you can prepare for outages to prevent them and to remediate instantly. Skip the Pretend Redundancy Detect and Triage Faults PCAP: Packet capture Ready for Remote Testing Logging Enabled & Synchronized Prepare the h...