thingQbator: Creating an education ecosystem to nurture innovation

thingQbator: Creating an education ecosystem to nurture innovation

Former US president John F. Kennedy once said, “Not everyone has equal abilities, but everyone should have equal opportunity for education.” Cisco’s purpose is to Power an Inclusive Future for All and it cuts across not only our products and services, but also the way we engage with the community. Providing quality education and equal opportunity as a basic human right is a dream every visionary leader wants to turn into a reality, and that’s…

Read More

Enterprise SSD prices are in for a drop

Enterprise SSD prices are in for a drop

CPU prices may be headed north, but thanks to an oversupply of NAND flash, SSD prices across the board are declining. The cause is an oversupply combined with the threat of a recession, according to Taiwanese market research firm TrendForce. The firm said a combination of slowing demand across all segments of the NAND memory business, along with a reluctance to invest in additional capacity, has led to the glut. As a result, TrendForce predicts…

Read More

Optics for hyperscale data centers (Part 4 of 4): Cisco Optics Podcast Episode 28 notes

Optics for hyperscale data centers (Part 4 of 4): Cisco Optics Podcast Episode 28 notes

Episode 28 of the Cisco Optics Podcast is now posted! See below for episode notes. Cisco Optics Podcast Episode 28 Optics for hyperscale data centers, with Ron Horan. Part 4 of 4. The rise of hyperscale data centers has upended computing and networking equipment business models over the past several years. The pluggable optics industry is no exception and has been impacted significantly. In Episode 28, we conclude our second conversation with Ron Horan, Cisco…

Read More

Malicious attacks are #1 cause of healthcare data breaches

Malicious attacks are #1 cause of healthcare data breaches

Malicious attacks are #1 cause of healthcare data breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Business Resiliency and Agility: The Need for Speed and Security

Business Resiliency and Agility: The Need for Speed and Security

It’s Blockbuster Night! Say that to any Gen-Xer and it should bring a smile and recollection of days gone by. Netflix took Blockbuster by storm and grew from mail order DVDs to the streaming behemoth they are today. One day, will we reminisce about brick and mortar financial services companies being replaced by digital-first financial services companies like Alipay, Block, Grab, Klarna and Paypal? While traditional financial services has some built-in regulatory barriers that makes…

Read More

1Password password manager: How it works with apps

1Password password manager: How it works with apps

Image: Wirestock/Adobe Stock Must-read security coverage If you’re like most people, you have dozens of passwords. It can be challenging to keep track of everything from your email account to your bank login. That’s where 1Password comes in. 1Password is a password manager that allows you to store all of your passwords in one place. As the name suggests, you only need to remember one password—the master password to your 1Password account. This makes accessing…

Read More

Demand for data sovereignty is moving to local government

Demand for data sovereignty is moving to local government

Today, the drive for “digital” public trust is changing IT priorities. Ever since the European Union issued the General Data Protection Regulation (GDPR) in 2016, a seismic shift has taken place globally toward the need for data sovereignty. Data sovereignty means that data are subject to the laws and regulations of the geographic location where the data are collected and processed.1 Over 100 countries now have data sovereignty laws.2 For example, European businesses can be…

Read More

A Relocation Travel Tale: From Mexico to Poland

A Relocation Travel Tale: From Mexico to Poland

Most Cisconians can tell you exactly where they were the moment they heard (or read) the words, “Congratulations! We’d love to offer you the role of …” and it was exactly those words for me that started my journey not only towards a new role at Cisco – but a new country as well – as I accepted a role as a Problem Manager in Security at our Krakow Customer Experience Center. A new role…

Read More

Cybercriminal dark web enterprises grow

Cybercriminal dark web enterprises grow

Cybercriminal dark web enterprises grow | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Global Malware Volumes Increase for First Time in Three Years

Global Malware Volumes Increase for First Time in Three Years

Global ransomware volumes shrunk by 23% year-on-year (YoY) in the first half of 2022, but overall malware surged by 11% over the period, according to new data from SonicWall. The mid-year update to the firm’s 2022 SonicWall Cyber Threat Report is based on analysis of one million security sensors over 200 countries, as well as third-party sources. The 2.8 billion malware attacks detected in the first half of 2022 represents the first recorded growth in…

Read More
1 2,819 2,820 2,821 2,822 2,823 4,083