Tackling theft within the cannabis supply chain

Tackling theft within the cannabis supply chain

Tackling theft within the cannabis supply chain | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Improving Cybersecurity — A Call for Introspection

Improving Cybersecurity — A Call for Introspection

Improving Cybersecurity — A Call for Introspection | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How Will the Metaverse Affect Cloud Security?

How Will the Metaverse Affect Cloud Security?

An immersive digital world enabled by a range of technologies, including the internet of things (IoT), blockchain, and virtual and augmented reality, the metaverse allows us to see and interact with objects and people. This virtual environment is enhanced by photorealistic avatars that can reproduce your real body through wearable sensors that measure your movements and immersive smart glasses that enable virtual and augmented reality. With these technologies, what you do in the real world…

Read More

New Sandbox for Nexus Dashboard and NDO

New Sandbox for Nexus Dashboard and NDO

Management, operations, and observability for the modern datacenter Our Cloud Networking (CN) BU has been putting in a lot of time to completely rethink management, operations, and observability for the modern datacenter, especially in our new hybrid work era. The result of this effort was Nexus Dashboard (ND), which serves as a foundational platform for the datacenter network and all the apps supporting it. Thomas Scheibe has a great blog about what Nexus Dashboard really…

Read More

Former Uber CSO found guilty of obstruction in attempted data breach cover-up

Former Uber CSO found guilty of obstruction in attempted data breach cover-up

Joe Sullivan schemed to hide a 2016 breach of 57 million users’ information shortly after he was hired. Image: AA+W/Adobe Stock Former Uber Chief Security Officer Joe Sullivan has been found guilty of criminal obstruction for attempting to conceal a 2016 data breach of tens of millions of customer and driver records. A federal jury in San Francisco convicted Sullivan Wednesday on charges of obstructing justice and concealing knowledge that a federal felony had been…

Read More

Want to Drive Industry Breakthroughs or Speed Up Innovation? Start by Optimising Your HPC and AI Workloads

Want to Drive Industry Breakthroughs or Speed Up Innovation? Start by Optimising Your HPC and AI Workloads

Artificial Intelligence (AI) is fast becoming the cornerstone of business analytics, allowing companies to generate value from the ever-growing datasets generated by today’s business processes. At the same time, the sheer volume and velocity of data demand high-performance computing (HPC) to provide the power needed to effectively train AIs, do AI inferencing, and run analytics. According to Hyperion Research, HPC-enabled AI, growing at more than 30 percent, is projected to be a $3.5 billion market…

Read More

With security, is a good offense good enough?

With security, is a good offense good enough?

The saying that “a good offense is the best defense” is true for sport and certainly for cybersecurity. But offensive positions cannot be static — keeping an offense strong requires agility, and an important part of the equation is recognizing what the challenges are so you can stay ahead of them. Cisco Customer Experience (CX) spends a lot of time thinking about how we address the trends that keep CISOs up at night. We’d like…

Read More

Why Having a Growth Mindset is Critical for Company Success

Why Having a Growth Mindset is Critical for Company Success

By Milan Shetti, CEO Rocket Software As a leader, setting the culture of an organization is a massive undertaking, especially if the task is to change the culture at a company that has been around for decades. How a culture is implemented in an organization oftentimes comes down to the idea of the company having a “fixed mindset” or a “growth mindset” – one will help the company get ahead, while the other can create…

Read More

Overcoming Cybersecurity Implementation Challenges

Overcoming Cybersecurity Implementation Challenges

By Haider Pasha, Sr. Director and Chief Security Officer for Emerging Markets at Palo Alto Networks Cybersecurity has long been one of the most complex landscapes an organization must navigate; with each new threat or vulnerability, complexity continues to grow. This is especially true for organizations that have traditionally taken a point product approach to their security because implementing new security measures properly and reliably takes time and expertise. Today, as more businesses look to…

Read More

Phishing attack spoofs Zoom to steal Microsoft user credentials

Phishing attack spoofs Zoom to steal Microsoft user credentials

Targeting more than 21,000 users, the phishing email managed to bypass Microsoft Exchange email security, says Armorblox. Image: ronstik/Adobe Stock Phishing attacks work by impersonating a familiar or trusted brand, product or company, often with the goal of tricking recipients into divulging sensitive account credentials. That’s exactly the case with a recent phishing campaign analyzed by security firm Armorblox in which the attacker spoofed Zoom in an attempt to compromise Microsoft user credentials. How the…

Read More
1 2,725 2,726 2,727 2,728 2,729 4,179