Israel: 054-321-6176 / USA - 210-820-3070 alan@weinkrantz.com

VOIP Security Technologist and Thought Leader Mark Collier Launches New Blog at VoiceCon Spring 2006

Our client,  SecureLogix Corporation announced that its Chief Technology Officer, Mark Collier, has launched a new blog, which is now online at  www.VOIPsecurityBlog.com devoted to tracking, collecting, and discussing the latest research and information on VOIP security threats and countermeasures. Mark  will announce his blog later today at VoiceCon Spring 2006, during his conference presentation entitled “VOIP Security: Managing Risk.”

As CTO of SecureLogix Corporation, an enterprise telephony
management and security company. he’s  responsible for technology
research, development, and related intellectual property, including a
special focus on VOIP security solutions. In addition to his corporate
R&D work, he has completed publicly-funded research into current
and future threats to VOIP systems, protocols, and application
services.

Mr. Collier is a frequently-quoted author and presenter on the topic
of voice and VOIP security, and is currently co-authoring a book on
VOIP security for McGraw-Hill’s popular “Hacking Exposed” IT security
series. He is a regular presenter at industry conferences including
VoiceCon, VON, Internet Telephony, IPComm, Avaya’s InAAU, and Nortel’s
INNUA Global Connect. Mr. Collier is a founding member of the VOIP Security Alliance, an industry group focused on VOIP security education.

“With IP as its foundation, it is simply unreasonable to expect VOIP
applications and devices to be any more secure than email, instant
messaging, web services, or DNS,” said Collier. “VOIP attacks are
beginning to occur and become documented, but we’ve not yet seen a
large proliferation of attacks. There are two fundamental reasons why.
The first is that there simply isn’t a large enough mass of deployed
VOIP systems for hackers to target. The second reason is that most
companies are only deploying VOIP in a limited fashion. Most are
completely internal, handset-to-handset deployments, with no external
VOIP connections to service provider networks or the public Internet.”

Welcome to the blogosphere, Mark.  Many happy posts!

Submit a Comment

Your email address will not be published. Required fields are marked *

Want To Join My Newsletter?