Human-Machine Interactions of the Future: Unpopular Opinions [Part 1]

Human-Machine Interactions of the Future: Unpopular Opinions [Part 1]

This is part 1 of a 3-part blog series on a Cisco futurist’s perspectives on some buzzy terms and technology trends. At Cisco, I’m responsible for looking at the future of human-machine interaction. The future of human-machine interaction spans an exploration into all kinds of futures — from the future of trust and higher education to the future of quantum internet and IoT. And when looking at, and projecting out likely futures, there is no…

Read More

Report: Digital trust is critical, but many enterprises are not prioritizing it

Report: Digital trust is critical, but many enterprises are not prioritizing it

One breach of digital trust can cause devastating reputational, regulatory and financial repercussions, according to ISACA’s State of Digital Trust 2022 survey findings. As enterprises worldwide compete in the race for digital transformation, a new study finds significant gaps between what they are doing now and what they should do to establish leadership and earn customer trust in the future digital ecosystem. Must-read security coverage The State of Digital Trust 2022 research report from ISACA…

Read More

Introducing the new Cisco WiFi-6 CBW150AX – Purpose-built for Small Business

Introducing the new Cisco WiFi-6 CBW150AX – Purpose-built for Small Business

At Cisco we’ve been relentlessly focusing on how to simplify IT – making it easier to manage, deploy, secure, and easier to buy. This effort to simplify doesn’t just cover large enterprise networks – we’re happy to do the same for small business as well. We’ve purposely engineered the Cisco Business portfolio of network switches and wireless access points to give you a secure and rock-solid network foundation but with affordable value pricing and without…

Read More

How to configure a standby Azure AD Connect server

How to configure a standby Azure AD Connect server

Organizations often use Azure AD Connect to maintain the relationship between their on-prem active directory and their Office 365/Azure cloud instance, and when doing this, it’s important that they build in redundancy with business continuity in mind. Recently our organization sought to make two meaningful changes to its sync relationship: set up a non-domain-controller AD Connect server configure the existing sync server as a standby for failover in the event of problems with the primary…

Read More

5 Tips to Help Create a Winning Grocery Loyalty Program

5 Tips to Help Create a Winning Grocery Loyalty Program

Like any other retailer, grocery stores want to build trust with their customers and keep them coming back. But the average bill and already slender margins in grocery can make it challenging to create a loyalty program that provides sufficiently compelling rewards. Nevertheless, it’s worth the effort, given that loyalty programs are a powerful incentive for grocery shoppers. In the US, for example, more than 60% of grocery store loyalty program members say that the…

Read More

Dispatch from the NACM: Day 3

Dispatch from the NACM: Day 3

  Today was the final day of the 2022 North America Community Meeting. Lindsay Goodspeed, Senior Manager of Corporate Communications, sits down to provide a recap of the day. Highlights from the conversation include: Keynote speaker Confidence Staveley of CyberSafe Foundation discusses the importance of diversity within the security industry. Kandyce Young, Standards Manager at PCI SSC, discusses PCI DSS v4.0 and where stakeholders can find supporting resources to help drive their understanding of the…

Read More

Juniper increases flexibility of its data-center automation and assurance platform

Juniper increases flexibility of its data-center automation and assurance platform

Juniper Networks has expanded the features of its Apstra intent-based networking software to include broader configuration and multiprotocol support, and has added a new licensing scheme. The latest version of Apstra includes a feature called Freeform Reference Designs  for designing data-center networks that support any protocol, topology or network domain. Data center reference designs are offered by all major data center players and typically feature validated, repeatable infrastructure system maps on how networked resources are…

Read More

Redefining the Role of IT in a Modern BI World

Redefining the Role of IT in a Modern BI World

IntroductionSince its inception decades ago, the primary objective of business intelligence has been the creation of a top-down single source of truth from which organizations would centrally track KPIs and performance metrics with static reports and dashboards. This stemmed from the proliferation of data in spreadsheets and reporting silos throughout organizations, often yielding different and conflicting results. With this new mandate, BI-focused teams were formed, often in IT departments, and they began to approach the…

Read More

AA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic Revolutionary Guard Corps-Affiliated Attacks

AA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic Revolutionary Guard Corps-Affiliated Attacks

Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks. Background On September 14, the Cybersecurity and Infrastructure Security Agency along with the National Security Agency, U.S. Cyber Command, Cyber National Mission Force, the Department of the Treasury, the Australian Cybersecurity Centre, the Canadian Centre for Cyber Security, and the U.K’s National Cyber Security Centre published a joint cybersecurity advisory (AA22-257A) detailing malicious activity…

Read More

Webworm Attackers Deploy Modified RATs in Espionage Attacks

Webworm Attackers Deploy Modified RATs in Espionage Attacks

The threat actor known as Webworm has been linked to several Windows–based remote access Trojans, suggests a new advisory by Symantec, a subsidiary of Broadcom Software. The group reportedly developed customized versions of three older remote access Trojans (RATs): Trochilus, Gh0st RAT and 9002 RAT.  The first of these tools, first spotted in 2005, is a RAT implemented in C++, and its source code is available for download on GitHub. Gh0st, on the other hand, was…

Read More
1 2,751 2,752 2,753 2,754 2,755 4,148