TalkingPointz

Research, analysis, and thought leadership for enterprise communications.

Telecom in Your Inbox

Safe Wi-Fi-ing

Colin Here. Hopefully you are aware that if you connect to a WiFi hotspot that doesn’t use a password you are basically sharing all of your data with the world….

Read the article →

Cloud Security Headlines

This week there were two major security headlines that might cause you to think twice about doing business in the cloud. The first was the celebrity photo leak. A very…

Read the article →

Fraud and the Blue Box

Colin here. A recurring, popular news theme is about hackers and the billions of dollars in fraud that they inflict upon the public. It’s a feel good topic that gets…

Read the article →

Who is Securing Who?

Colin here. The NSA spying has been in the press a lot. Up until Snowden the NSA strongly professed it had no mass surveillance.  Now, it is clear that they…

Read the article →

Explore PinDropSoup

How to Secure Corporate Communications

Colin here. Probably the question that I am most asked anymore is whether we should use more encrypted communications to protect our corporate secrets and confidential information. The undercurrent is…

Read the article →

@DaveMichels

You can follow @TalkingPointz for the best UC headlines on Twitter (bot)

Point to Point and PRISM

Colin here with a question: Does Point to Point Communications bypass PRISM? PRISM has been in the media a lot recently. And, it has raised a lot of questions about…

Read the article →

Sectionalization of Comms Then and Now

Colin here. The internet appears to be doomed. Its been recently revealed that the US government is monitoring and recording most of the communications on the Internet. They do this…

Read the article →

A History of Secrecy in Communications

Colin here. In light of the recent PRISM scandal where the NSA has been revealed of intercepting and recording most communications on the internet, it is interesting to take an historical…

Read the article →

Dave Michels

About Dave

Dave is a self-proclaimed Tele-communications Contemplator. Most industry professionals gravitate toward the role of Analyst, Consultant or Journalist, but Dave blends all three as a professional Contemplator. Learn more →.

Does SSL Equate to Privacy?

Colin here. Perhaps the most frequent question I get asked recently is whether SSL/TLS security certificates protect the privacy of communications. Should we all switch to using SSL/TLS for our…

Read the article →

KimDotCom

Colin here. It’s very rare when an individual raises to the level that they are worth listening to. Steve Jobs was one of those people. Kim Dotcom may be another…I’m…

Read the article →

Is Security That Complicated

Colin here. I recently had to set up an account with a US Government web site. I had a dickens of a time picking a password. They had amazing rules:…

Read the article →

RIM:Back From the Brink?

I am a sucker for the underdog. I love the battle, the strategy, the market dynamics. The ‘We’re Not Number One, So We Try Harder’ mentality. I think that’s why…

Read the article →

Do You Suffer from Nomophobia ?

File this under Things People Research When They Have Too Much Time. The following research was sent to me by securenvoy.com, I thought I would share it. First identified in 2008,…

Read the article →

Parlez-vous L33t?

You are most likely familiar with numbers being used to implicate letters, phrases or even symbols. In SMS (txting) shortcuts, for instance, 2 can also be used for “to”, 4 can…

Read the article →

My Keychain

A lot of things are changing these days – books, newspapers, retail, communications, etc. But this one snuck up on me. Take a look at my keychain: Look ma, no…

Read the article →