Securing your voice traffic, but how?

Securing your voice traffic, but how? Understanding how voice is encapsulated and its vulnerabilities. Explaining the importance of network security to our clients could be challenging. Two months ago I helped deploy a new Session Border Controller for one of our clients in Jacksonville FL. They were hesitant on adding this piece of equipment to […]