3 Key Considerations for CEOs and Their CIOs for Building an Agile, Modern Network

3 Key Considerations for CEOs and Their CIOs for Building an Agile, Modern Network

By: Lars Koelendorf, EMEA Vice President, Solutions & Enablement at Aruba, a Hewlett Packard Enterprise company Can an enterprise CEO today be successful without having a strong relationship with the CIO and the corporate network? The short answer is no. Technology today powers and enables so much of how businesses function. Given the pace of digitization, the corporate network, led by the CIO, is increasingly becoming a critical business decision center for the CEO within…

Read More

Mercy Corps: Digital solutions for basic needs

Mercy Corps: Digital solutions for basic needs

This piece was previously published on Mercy Corps Technology for Development blog. In 2017, Cisco launched a 5-year, $10 million partnership with Mercy Corps called Technology for Impact. Our goal was to help Mercy Corps use technology to deliver humanitarian aid faster, more efficiently, and to more people. When crisis strikes, upending households and their sense of stability, the security in knowing that basic needs will still be met is a critical first step in…

Read More

Overcoming Security Hurdles for IOT Projects

Overcoming Security Hurdles for IOT Projects

By Phil Beecher, CEO and President, Wi-SUN Alliance Five years ago, Wi-SUN Alliance published its first Internet of Things (IoT) ‘state of the nation’ report. At the time, we were not surprised to see security as one of the main concerns among survey respondents (IT decision makers who are IoT adopters in UK and US organizations), with the majority ranking security as one of their top three challenges when rolling out IoT. But attitudes –…

Read More

How enterprise security leaders can benefit from access control in coworking spaces

How enterprise security leaders can benefit from access control in coworking spaces

How enterprise security leaders can benefit from access control in coworking spaces | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Why Don’t You Go Dox Yourself?

Why Don’t You Go Dox Yourself?

Whether or not you’ve heard the term “doxxing” before, you’re probably familiar with the problem it names: collecting personal information about someone online to track down and reveal their real-life identity. The motivations for doxxing are many, and mostly malicious: for some doxxers, the goal in tracking someone is identity theft. For others, it’s part of a pattern of stalking or online harassment to intimidate, silence or punish their victim –  and overwhelmingly, victims are…

Read More

9 business intelligence certifications to advance your BI career

9 business intelligence certifications to advance your BI career

With data increasingly vital to business success, business intelligence (BI) continues to grow in importance. With a strong BI strategy and team, organizations can perform the kinds of analysis necessary to help users make data-driven business decisions. BI encompasses numerous roles. BI analysts, with an average salary of $71,493 according to PayScale, provide application analysis and data modeling design for centralized data warehouses and extract data from databases and data warehouses for reporting, among other…

Read More

Skills and traits of elite product managers

Skills and traits of elite product managers

The days when IT was left to its own (literal) devices, content to work on the tech side of various projects, are on their way out. IT organizations are shifting to product-based methodologies, in which cross-functional teams made up of both tech and business pros focus on a single product or service offering. This organizational shift has given new importance to the product manager, who serves as the leader for such a team and acts…

Read More

US Warns of Foreign Disinfo Ops Ahead of Midterms

US Warns of Foreign Disinfo Ops Ahead of Midterms

The US authorities have urged voters to critically evaluate any information they receive about the upcoming midterms, after warning that foreign actors may seek to sow doubt about the result. The FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) stated in a new Public Service Announcement (PSA) yesterday that attempts to manipulate information or spread disinformation could appear in the lead up to and after the elections in November. “Foreign actors may intensify…

Read More

Meta Sues Chinese Devs over WhatsApp Malware Plot

Meta Sues Chinese Devs over WhatsApp Malware Plot

WhatsApp parent company Meta is suing three Chinese developers for allegedly tricking users into downloading fake versions of the app that harvested their login details. WhatsApp and Meta are listed as plaintiffs in the case, filed in the US District Court for the Northern District of California this week, against Hong Kong’s Rockey Tech HK and Beijing Luokai Technology, and Taiwan’s ChitChat Technology. The defendants are accused of distributing at least two malicious apps, “AppUpdater for…

Read More

Hacker Steals Over $570m from Binance Bridge

Hacker Steals Over 0m from Binance Bridge

Cyber-criminals have stolen an estimated two million Binance coins (BNB) from a popular cross-chain bridging service, potentially landing them with a haul of over $570m at today’s exchange rates. Twitter user @samczsun, a researcher at crypto investment firm Paradigm, explained in a thread on the social media site how the heist at Binance Bridge happened. He claimed that the hacker managed to exploit a vulnerability in the way the bridging service validates “proofs,” enabling them…

Read More
1 2,724 2,725 2,726 2,727 2,728 4,179