SlideShare uma empresa Scribd logo
1 de 85
Baixar para ler offline
The State Of VoIP Security, a.k.a.!
                   !
“Does Anyone Really Give A _____ About
           VoIP Security?”




               Dan York, CISSP!
        Chair, VoIP Security Alliance



                                         October 5, 2011
© 2011 VOIPSA
                http://www.flickr.com/photos/willpate/46488553/
Does Anyone Really !
                Give A _____ About!
                  VoIP Security?


© 2011 VOIPSA
Does Anyone Really !
        Give A _____ About!
           VoIP Unified
     Communications Security?

© 2011 VOIPSA
Technical Solutions




© 2011 VOIPSA
Widely Deployed




© 2011 VOIPSA
TLS-Encrypted SIP




© 2011 VOIPSA
Secure RTP (SRTP)




© 2011 VOIPSA
MORE Secure!
                 Than PSTN



© 2011 VOIPSA
© 2011 VOIPSA
                http://www.flickr.com/photos/mattblaze/2275723713/
MORE Secure!
                Than Ever Before



© 2011 VOIPSA
Almost All Venders!
                  Have Support



© 2011 VOIPSA
Almost All Customers!
                  Don’t Turn It On



© 2011 VOIPSA
Why Not?




© 2011 VOIPSA
Complexity




© 2011 VOIPSA
Fingerpointing, a.k.a. “One Throat To Choke”



                              PSTN
                   PBX       Gateways




                             Physical
                 Voicemail
                              Wiring




© 2011 VOIPSA
Fingerpointing - 2011
                                            Mobile
                                            Devices
                    IM                                                      Application
                                                          Internet           Servers
                 Networks          Operating
                                   Systems
                                                PSTN
                      IP-PBX                   Gateways
                                                                     VoIP


                  Web               IP                                       Social
                                                       Firewalls
                 Servers          Network                                   Networks

                                               Physical         Directory
                      Voicemail
                                                Wiring          Servers
                                  Desktop
                 Email             PCs                                  Database
                Servers                                CRM               Servers
                                                      Systems
                                       Session
                                       Border
                                      Controllers




© 2011 VOIPSA
“UC”




© 2011 VOIPSA
Debugging




© 2011 VOIPSA
Turn It Back On?




© 2011 VOIPSA
SIP Is So Simple, Right?




© 2011 VOIPSA
Riiiiiigggghhhttt… (Fingerpointing Redux)




© 2011 VOIPSA
Evolution




© 2011 VOIPSA
The Old Boys’ Club


                                  Carrier
                                                 Carrier
                    Carrier



                                  PSTN                Carrier
                Carrier


                              Carrier       Carrier




© 2011 VOIPSA
The Wild West… 
                                                                    ITSP
                                                                                                    ITSP
                                                                                                                   ITSP
                                                                     ITSP
                                             ITSP

                                                                                                       ITSP

                                                                                                                           ITSP
                              ITSP
                                                                  ITSP
                                                                                     ITSP              ITSP
                                                    ITSP
                                                                                                                      ITSP


                     ITSP                                         PSTN                       ITSP
                                                ITSP

                     ITSP                                                                                   ITSP
                                                              ITSP            ITSP
                                      ITSP

     ITSP
                                                                                                     ITSP           ITSP
                     ITSP                    ITSP      ITSP                        ITSP



                                                                                                    ITSP       ITSP
      ITSP                           ITSP                  ITSP             ITSP          ITSP
© 2010 VOIPSA and Owners as Marked
© 2011 VOIPSA
Evolution of Attacks




© 2011 VOIPSA
DoS




© 2011 VOIPSA
DDoS




© 2011 VOIPSA
Fraud




© 2011 VOIPSA
If 1 Is Good, Why Not 3?




© 2011 VOIPSA
Geography



© 2011 VOIPSA
Internet   LAN




© 2011 VOIPSA
PC


                    UC
                  System
                                 Firewall   Internet    Home
                                                       Firewall



                                                                    IP
                Corp	
  HQ	
                                      Phone
                                                       Home	
  




© 2011 VOIPSA
Laptop
                                                                         UC
                                                                        client
                                                          WiFi
                    UC
                  System
                                 Firewall   Internet      Café
                                                         Router



                Corp	
  HQ	
  
                                               Mobile
                                                Data
                                               Network        Mobile
                                                               UC
                                                              client




© 2011 VOIPSA
Corporate
                                                                   Internet
                             Network

                                                             IVR                    Voicemail
                   IM             IM              IM

                Presence       Presence        Presence

                  Call           Call            Call
                 Control        Control         Control              Conferencing




           Corp	
  HQ	
      Office	
  A	
     Office	
  B	
  



                             PSTN


© 2011 VOIPSA
© 2011 VOIPSA
Benefits
                (for us… and for attackers)




© 2011 VOIPSA
DDoS!
                     (the old-fashioned kind)!
                                               
                (Asterisk & Amazon EC2, anyone?)




© 2011 VOIPSA
SPIT!
                                              
                (“SPam for Internet Telephony”)




                           SPAM

© 2011 VOIPSA
Complexity




© 2011 VOIPSA
Fingerpointing - 2011
                                            Mobile
                                            Devices
                    IM                                                      Application
                                                          Internet           Servers
                 Networks          Operating
                                   Systems
                                                PSTN
                      IP-PBX                   Gateways
                                                                     VoIP


                  Web               IP                                       Social
                                                       Firewalls
                 Servers          Network                                   Networks

                                               Physical         Directory
                      Voicemail
                                                Wiring          Servers
                                  Desktop
                 Email             PCs                                  Database
                Servers                                CRM               Servers
                                                      Systems
                                       Session
                                       Border
                                      Controllers




© 2011 VOIPSA
The Device Formerly!
                    Known As A!
                     “Phone”



© 2011 VOIPSA
Mobility




© 2011 VOIPSA
RTCWEB / WebRTC




© 2011 VOIPSA
Complexity




© 2011 VOIPSA
Fingerpointing - 2011
                                            Mobile
                                            Devices
                    IM                                                      Application
                                                          Internet           Servers
                 Networks          Operating
                                   Systems
                                                PSTN
                      IP-PBX                   Gateways
                                                                     VoIP


                  Web               IP                                       Social
                                                       Firewalls
                 Servers          Network                                   Networks

                                               Physical         Directory
                      Voicemail
                                                Wiring          Servers
                                  Desktop
                 Email             PCs                                  Database
                Servers                                CRM               Servers
                                                      Systems
                                       Session
                                       Border
                                      Controllers




© 2011 VOIPSA
Interoperability




© 2011 VOIPSA
“The Hitchiker’s Guide!
                       To SIP”



© 2011 VOIPSA
Forgotten!
                Simple Things



© 2011 VOIPSA
Biggest Financial Threat?




© 2011 VOIPSA
Toll Fraud




© 2011 VOIPSA
IT Security 101




© 2011 VOIPSA
PIN = “1234”




© 2011 VOIPSA
Password = “password”




© 2011 VOIPSA
Default password list




© 2011 VOIPSA
VoIP = bits




© 2011 VOIPSA
IT Security 101




© 2011 VOIPSA
Does Anyone Really !
                Give A _____ About!
                  VoIP Security?


© 2011 VOIPSA
WHEN Will They Care?




© 2011 VOIPSA
EVENT




© 2011 VOIPSA
Identity Theft




© 2011 VOIPSA
Celebrity




© 2011 VOIPSA
Trusted Leader




© 2011 VOIPSA
“VoIP Is Insecure!!!”




© 2011 VOIPSA
depl oyed
            tupi dly
        S
                “VoIP Is Insecure!!!”
                 ^



© 2011 VOIPSA
“VoIP Is Insecure!!!”




© 2011 VOIPSA
Cover Your ____




© 2011 VOIPSA
SOLUTIONS?




© 2011 VOIPSA
IT Security 101




© 2011 VOIPSA
Audit, Audit, Audit




© 2011 VOIPSA
Enable What You Have




© 2011 VOIPSA
Interoperability




© 2011 VOIPSA
www.sipit.net




© 2011 VOIPSA
Identity




© 2011 VOIPSA
Simplicity




© 2011 VOIPSA
Fabric




© 2011 VOIPSA
Air




© 2011 VOIPSA
© 2011 VOIPSA
Secure By Default




© 2011 VOIPSA
Education




© 2011 VOIPSA
What is the Industry Doing to Help?




       Security Vendors                  VoIP Vendors

       “The Sky Is Falling!”             “Don’t Worry, Trust Us!”
       (Buy our products!)                 (Buy our products!)




© 2011 VOIPSA
www.voipsa.org/Resources/tools.php




© 2011 VOIPSA
Security Links

    •  VoIP Security Alliance - http://www.voipsa.org/ 
         –  Threat Taxonomy      
- http://www.voipsa.org/Activities/taxonomy.php
         –  VOIPSEC email list   
- http://www.voipsa.org/VOIPSEC/
         –  Weblog 
        
    
- http://www.voipsa.org/blog/
         –  Security Tools list  
- http://www.voipsa.org/Resources/tools.php
         –  Blue Box: The VoIP Security Podcast - http://www.blueboxpodcast.com 


    •  NIST SP800-58, “Security Considerations for VoIP Systems”
         –  http://csrc.nist.gov/publications/nistpubs/800-58/SP800-58-final.pdf
    •  Network Security Tools
         –  http://sectools.org/
    •  Hacking Exposed VoIP site and tools
         –  http://www.hackingvoip.com/
    •  Seven Deadliest Unified Communications Attacks
         –  http://www.7ducattacks.com/



© 2011 VOIPSA
Thank You For!
                Giving A _____



© 2011 VOIPSA
Thank you!               Q & eh?




                www.voipsa.org
                                                   7ducattacks.com

                Dan York - dan.york@voipsa.org!
                +1-802-735-1624
                DisruptiveTelephony.com
                danyork.com!                      blueboxpodcast.com
                twitter.com/danyork




© 2011 VOIPSA

Mais conteúdo relacionado

Mais de Dan York

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Dan York
 
SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?Dan York
 
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?Dan York
 
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Dan York
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDan York
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Dan York
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItDan York
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecurityDan York
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveDan York
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise NetworkDan York
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLDan York
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101Dan York
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeDan York
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowDan York
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesDan York
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationDan York
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)Dan York
 

Mais de Dan York (17)

Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible) Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
Yes, IPv6 is Real! How To Make Your Apps Work (And Be As Fast As Possible)
 
SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?SIPNOC 2014 - Is It Time For TLS for SIP?
SIPNOC 2014 - Is It Time For TLS for SIP?
 
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
 
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
Open Source and The Global Disruption Of Telecom: What Choices Will We Make?
 
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 HackathonDNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
DNS / DNSSEC / DANE / DPRIVE Results at IETF93 Hackathon
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
How IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About ItHow IPv6 Will Kill Telecom - And What We Need To Do About It
How IPv6 Will Kill Telecom - And What We Need To Do About It
 
SIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and SecuritySIP, Unified Communications (UC) and Security
SIP, Unified Communications (UC) and Security
 
ClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin SteveClueCon2009: The Security Saga of SysAdmin Steve
ClueCon2009: The Security Saga of SysAdmin Steve
 
SIP Trunking & Security in an Enterprise Network
SIP Trunking & Security  in an Enterprise NetworkSIP Trunking & Security  in an Enterprise Network
SIP Trunking & Security in an Enterprise Network
 
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XMLOSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
OSCON 2008: Mashing Up Voice and the Web Using Open Source and XML
 
IP Telephony Security 101
IP Telephony Security 101IP Telephony Security 101
IP Telephony Security 101
 
Recording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/SkypeRecording Remote Hosts/Interviews with VoIP/Skype
Recording Remote Hosts/Interviews with VoIP/Skype
 
Hacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To KnowHacking and Attacking VoIP Systems - What You Need To Know
Hacking and Attacking VoIP Systems - What You Need To Know
 
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best PracticesE Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
E Tel2007 Black Bag Session - VoIP Security Threats, Tools and Best Practices
 
BLISS Problem Statement and Motivation
BLISS Problem Statement and MotivationBLISS Problem Statement and Motivation
BLISS Problem Statement and Motivation
 
ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)ETel2007: The Black Bag Security Review (VoIP Security)
ETel2007: The Black Bag Security Review (VoIP Security)
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

The State of VoIP Security, a.k.a. “Does Anyone Really Give A _____ About VoIP Security?"