1. Is your Session Border Controller providing a false sense of security?. Issue 1 (January 2017) Authors: German, Paul Journal: Network security Issue: Volume 2017:Issue 1(2017:Jan.) Page Start: 14 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Face the facts – your organisation will be breached. Issue 8 (August 2016) Authors: German, Paul Journal: Network security Issue: Volume 2016:Issue 8(2016:Aug.) Page Start: 9 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Counting the security cost of cheap calls. (November 2015) Authors: German, Paul Journal: Network security Issue: (2015:Nov.) Page Start: 9 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. A new month, a new data breach. Issue 3 (March 2016) Authors: German, Paul Journal: Network security Issue: Volume 2016:Issue 3(2016:Mar.) Page Start: 18 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. The SIP security fallacy. Issue 6 (June 2016) Authors: German, Paul Journal: Network security Issue: Volume 2016:Issue 6(2016:Jun.) Page Start: 18 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Time to bury dedicated hardware-based security solutions. Issue 8 (August 2017) Authors: German, Paul Journal: Network security Issue: Volume 2017:Issue 8(2017:Aug.) Page Start: 13 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. The dangers of unsecured voice. Issue 5 (May 2015) Authors: German, Paul Journal: Network security Issue: Volume 2015: Issue 5(2015:May) Page Start: 18 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗