Enhance Cyber Defense with 2022 Cybersecurity Trends

Enhance Cyber Defense with 2022 Cybersecurity Trends

To modernize your cybersecurity strategy, you must understand the imminent risks. Our Midyear Roundup Report helps CISOs and security leads anticipate what’s next, enabling a stronger cyber defense strategy to recognize, assess, and mitigate cyber threats. Trend Micro Midyear 2022 Cybersecurity Roundup Report Each summer, Trend Micro analyzes and correlates attack surface intelligence from approximately 400,000 commercial customers and 20 million consumer customers, alongside data lakes and partnering with third-party research firms. We also review…

Read More

Select the Right Tech for the Right Transformation Task, Huawei Advises

Select the Right Tech for the Right Transformation Task, Huawei Advises

Huawei kicked off its Huawei Connect 2022 tour in Bangkok as it sets off on a world tour. The massive exhibition brings together ICT leaders, experts, and partners to unleash digital productivity, build stronger digital ecosystems, and promote the digital economy. CIO Editor Andrea Benito visited the exhibition and sat down with Derek Hao, President of Global Marketing, Huawei Enterprise Business Group, on why the key to accelerating digital transformation is matching the right technologies…

Read More

Focus on HyperFlex: A new operator for Red Hat

Focus on HyperFlex: A new operator for Red Hat

This blog series focuses on various aspects of Cisco HyperFlex. In today’s blog we’ll take a quick look at how the HyperFlex CSI Operator for Red Hat OpenShift Container Platform is packaged and how simple it is for you to setup and configure so developers can be off and running with persistent storage for their container workloads. HyperFlex now tightly coupled with Open Shift Red Hat OpenShift Container Platform (RHOCP) is one of the most…

Read More

The Continuous Developer

The Continuous Developer

One of the things about being a developer is the need to learn new skills and technologies as the industry changes. We know one thing for certain, the languages, frameworks, and architectures we use today will give way to others soon. Keeping up with industry trends is an important task but can be an overwhelming stream of topics. This is one of the reasons I’m so excited Cisco is starting the Develop series. Testing, infrastructure,…

Read More

Digitization of the Distribution Grid

Digitization of the Distribution Grid

Co-authored by Jose Peinado Electric grids are being modernized to be “smarter” and more resilient, using cutting-edge technologies, equipment, and controls that communicate and work together to deliver electricity more reliably and efficiently. At the heart of this transformation is the digitization of the electrical grid, which includes grid management software that consumes streams of data from newly digitized power system endpoints. As utilities become more operationally reliant on digital power systems to drive reliability,…

Read More

Ukraine Enhances Cooperation with EU Cybersecurity Agencies

Ukraine Enhances Cooperation with EU Cybersecurity Agencies

Representatives from Ukraine’s State Service of Special Communications and Information Protection (SSSCIP) and the European Union Agency for Cybersecurity (ENISA) recently met to discuss strengthening cooperation and networking. The working meeting was held during the visit to ENISA HQ in Athens as a part of the Cybersecurity East Project. Viktor Zhora, SSSCIP deputy head, said after the meeting: “Cooperation with the European partners includes two key vectors for our country. On the one hand, Ukrainian experience…

Read More

Deep Dive into High Availability Features in Cisco Enterprise Devices

Deep Dive into High Availability Features in Cisco Enterprise Devices

Part 2 of the 3-part High Availability Series My recent blog on high availability (HA) for enterprises provided an overview of features in Cisco IOS XE Software that contribute to HA. On three continents, Cisco software engineers are working on IOS XE features that embed multiple processes for failover in bare metal, virtualized, and wireless infrastructure. They are engineering ways to maintain device state without interruption with real-time data synchronization, ensuring data is encrypted and…

Read More

Intel Confirms Source Code Leak

Intel Confirms Source Code Leak

Intel has confirmed that the alleged leak of its Alder Lake BIOS source code is authentic, potentially raising cybersecurity risks for customers. Last week, the firm’s BIOS/UEFI code was apparently posted on 4chan and Github in a repository named ‘ICE_TEA_BIOS.’ This repository contains 5.97 GB of files, source code, private keys, change logs and compilation tools. In a statement to Tom’s Hardware, an Intel spokesperson said: “Our proprietary UEFI code appears to have been leaked…

Read More

Vulnerability exploitation is top initial access vector for ransomware

Vulnerability exploitation is top initial access vector for ransomware

Vulnerability exploitation is top initial access vector for ransomware | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

ThermoSecure: Cracking Passwords Using Finger Heat on Keyboards is Now Possible

ThermoSecure: Cracking Passwords Using Finger Heat on Keyboards is Now Possible

What if a hacker could guess your passwords from the heat you leave behind on your keyboard? A group of computer security researchers at the University of Glasgow’s School of Computing Science in the UK succeeded in deploying such an attack. In a paper to be published in the upcoming issue of the ACM Transactions on Privacy and Security journal, a team led by associate professor Mohamed Khamis developed ThermoSecure, a system using a thermal imaging camera…

Read More
1 2,720 2,721 2,722 2,723 2,724 4,180