To Patch or Not to Patch in OT – That Is the Real Challenge

To Patch or Not to Patch in OT – That Is the Real Challenge

The objective of an organization when implementing cybersecurity controls is to eliminate risk, but this oftentimes involves settling for managing risk at an acceptable level. Each organization defines what that acceptable level is depending on several factors including the environment, the criticality of function, the asset type, etc. There are many methods and techniques that an organization can then use to manage this risk. One of the most commonly used methods is patching. At the…

Read More

Four Strategies to Mitigate Pass-the-Cookie Attacks

Four Strategies to Mitigate Pass-the-Cookie Attacks

Another year, another new set of cybersecurity threats to overcome, outwit and mitigate against. At the beginning of 2021, the cybersecurity world was informed by CISA (the USA Cybersecurity and Infrastructure Security Agency) of a spate of attacks targeting cloud environment configurations, supposedly occurring as a result of the increase in remote working. Once you add to the mix the fact that corporate and personal devices were being used – often simultaneously – to access…

Read More

Future voices – education needs in the 21st Century – Cisco Blogs

Future voices – education needs in the 21st Century – Cisco Blogs

Learning for all ages moved online overnight when Covid struck. Many students adapted incredibly well to this new environment while others struggled due to lack of access. This experience has taught us valuable lessons and it’s forced us to think again about learning delivery. While there are very few cases where 100% virtual learning is the best long-term solution, there are definitely aspects of our recent experience that providers and students will want to keep….

Read More

NetApp dumps its HCI hardware in favor of Kubernetes

NetApp dumps its HCI hardware in favor of Kubernetes

NetApp, one of many players in the hyperconverged infrastructure (HCI) hardware business, plans to end production of its NetApp HCI hardware and focus instead on its Project Astra Kubernetes platform. HCI is split into two categories, software and hardware. On the software side, it’s roughly an even split in marketshare between Nutanix and VMware. On the hardware side, IDC and Gartner both list HCI leaders as HP Enterprise, Dell Technology, Cisco Systems, and “the rest…

Read More

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a new proof-of-concept exploit that could be adapted to install web shells on Microsoft Exchange servers vulnerable ProxyLogon issues. Since the disclosure of the flaw, security experts observed a surge in the attacks against Microsoft Exchange mailservers worldwide. Check Point Research team reported that that in…

Read More

Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

By Michael Morris, Director of Global Business Development, Endace We’ve all read the news and seen the stats, so it comes as no surprise that SecOps teams are incredibly short-staffed and there is no quick fix. But the actual numbers are quite staggering: more than four million professionals are needed worldwide to close the cybersecurity skills gap, and that number is expected to increase exponentially in years to come ((ISC)2 Research, Nov 2019). SecOps and…

Read More

Your SD-WAN solution should deliver immediate ROI benefits

Your SD-WAN solution should deliver immediate ROI benefits

The cloud revolution has ushered in the greatest transformation of business operations and workflows in history. Cloud applications are now the foundation of most organizations, which has greatly enhanced business productivity and collaboration. And these essential applications need to be efficient and reliable—which is why SD-WAN is becoming one of the most successful networking functions in decades. Fast and reliable business applications running on agile, secure network connections is the name of the game. The recent…

Read More

Aruba Recognized as a 2021 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure for EdgeConnect’s Customer Experiences

Aruba Recognized as a 2021 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure for EdgeConnect’s Customer Experiences

“Customer First, Customer Last” has been Aruba’s #1 core value since our founding in 2002, a mantra our customers have come to know and trust. And it’s a key contributor to our loyal customer base and continued market growth, which has outpaced the industry for the past several years. This core value extends to our recent acquisition of Silver Peak and its industry leading WAN edge platform, formerly Unity EdgeConnect. Everything we do, whether it’s…

Read More

Aruba Recognized as a 2021 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure for EdgeConnect’s Customer Experiences

Aruba Recognized as a 2021 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure for EdgeConnect’s Customer Experiences

“Customer First, Customer Last” has been Aruba’s #1 core value since our founding in 2002, a mantra our customers have come to know and trust. And it’s a key contributor to our loyal customer base and continued market growth, which has outpaced the industry for the past several years. This core value extends to our recent acquisition of Silver Peak and its industry leading WAN edge platform, formerly Unity EdgeConnect. Everything we do, whether it’s…

Read More
1 2,633 2,634 2,635 2,636 2,637 2,678