Is Your Security Log ‘Bathtub’ About to Overflow?

Is Your Security Log ‘Bathtub’ About to Overflow?

By Ozan Unlu, CEO and Founder, Edge Delta Security Log Data – More Data Doesn’t Always Mean Better Protection A major issue that security operations teams face is the aggressive speed at which vulnerabilities are being exploited, coupled with massively increasing data volumes (relating to security events) being generated across current infrastructures. Security logs can be extremely useful for helping identify or investigate suspicious activity, and  are a cornerstone of every traditional SIEM platform. But…

Read More

Wi-Fi is “the” unlicensed spectrum technology…and it needs access to more unlicensed spectrum!

Wi-Fi is “the” unlicensed spectrum technology…and it needs access to more unlicensed spectrum!

The Preamble For the last five years, I have spent considerable time turning my mind to the issues of good and bad coexistence between Wi-Fi and competing technologies, such as LTE‑U, LAA, and NR‑U, in unlicensed spectrum. I have undertaken my thinking in the context of discussions and debates about coexistence in multiple forums, including IEEE 802, 3GPP, ETSI BRAN, and the Wi-Fi Alliance. I even ended up as the Chair of the IEEE 802.11…

Read More

Wi-Fi is “the” unlicensed spectrum technology…and it needs access to more unlicensed spectrum!

Wi-Fi is “the” unlicensed spectrum technology…and it needs access to more unlicensed spectrum!

The Preamble For the last five years, I have spent considerable time turning my mind to the issues of good and bad coexistence between Wi-Fi and competing technologies, such as LTE‑U, LAA, and NR‑U, in unlicensed spectrum. I have undertaken my thinking in the context of discussions and debates about coexistence in multiple forums, including IEEE 802, 3GPP, ETSI BRAN, and the Wi-Fi Alliance. I even ended up as the Chair of the IEEE 802.11…

Read More

The state of 5G in South Asia 2022, country-by-country guide

The state of 5G in South Asia 2022, country-by-country guide

The eight nations that constitute South Asia vary enormously in size and economic and technological power: from the tiny landlocked kingdom of Bhutan, population less than 1 million and a GDP of US$2.4 billion, to India with a population of 1.4 billion and a GPD of US$2.6 trillion. But their 5G progress does not match their size and economic power. The two smallest nations—Bhutan and Maldives—both have commercial 5G services. The two largest—India and Pakistan—have…

Read More

Cisco U. Inclusive Learning, Delivered

Cisco U. Inclusive Learning, Delivered

We recently introduced Cisco U., one of our newest learning initiatives, at Cisco Live. Cisco U. promises to meet the diverse global community through an inclusive digital learning experience. If you’re wondering what that means, well, I’m so glad. Inclusive learning is something that is a huge priority for me on a personal level. And as a member of the product team for Cisco U., I find myself uniquely positioned to explain how Cisco U….

Read More

How To Guard Critical Infrastructure Against the Sophisticated ‘Golden Ticket’ Attacks

How To Guard Critical Infrastructure Against the Sophisticated ‘Golden Ticket’ Attacks

The Powerful ‘Golden Ticket’ Attacks are Surging in Popularity – What You Need to Know By David Levine, Director of Solution Architects, Remediant Golden ticket attacks aren’t anything new to the cybersecurity industry, but the latest surge in successful attacks from the Chinese-speaking APT group, TA428, and other cyber espionage gangs, have served as a hard reminder for all on just how powerful these attacks can be. The incidents have also highlighted what aspects of…

Read More

CX Takes Center Stage for Cisco

CX Takes Center Stage for Cisco

October 4th marks the 10th anniversary of CX Day, a day designed to recognize and celebrate the critical importance of the customer experience (CX) and the community and companies that support CX. But one day isn’t enough for us at Cisco: we are getting ready to kick off an entire week of CX-related events called CX on Tour! We’re extending the celebration to mirror the extraordinary impact CX brings to Cisco and provide greater awareness…

Read More

A Cisconian From the Start

A Cisconian From the Start

 This post was authored by Abhinav Talesra, a recent software engineering intern in our Enterprise Networking Engineering Group. “Welcome to CISCO!” a powerful yet soothing voice sparked the virtual meeting room with zest and zeal. Numerous thoughts within me SHOUTED, “Yessssss! I have seized, grabbed, and conquered this once-in-a-lifetime opportunity to become a part of Cisco with the best and the brightest intellectuals from around the world.” Hurray! I did it!!! Maybe as an intern for…

Read More

Episode 3: Unlock Your Modernization Advantage: Your Database

Episode 3: Unlock Your Modernization Advantage: Your Database

Modernization is on the minds of IT decision makers, and with good reason — legacy systems cannot keep up with the realities of today’s business environment. Additionally,      many organizations are discovering their modernization advantage: their developer teams, and the databases that underpin  their applications. “Legacy modernization is really a strategic initiative that enables you to apply the latest innovations in development methodologies and technology to refresh your portfolio of applications,” says Frederic Favelin, EMEA Technical…

Read More

This cloud storage with NAS support costs less than you think

This cloud storage with NAS support costs less than you think

The ElephantDrive cloud solution offers two years of 1TB storage for just $38.99. Image: StackCommerce When it comes to cloud storage, most providers seem to aim for one of two key features: convenience or security. But wouldn’t it be nice to have both? With ElephantDrive, you can. This highly-rated service uses strong encryption to protect your data, and it syncs with all your devices, including NAS drives. In a special deal for TechRepublic readers, you…

Read More
1 2,740 2,741 2,742 2,743 2,744 4,178