Align, Enable, Accelerate Americas Distribution

Align, Enable, Accelerate Americas Distribution

For over 60 years, the United States has had a civilian agency responsible for space exploration and to push the boundaries on scientific and technical limits. Society, for as long as there has been intelligent life, has been searching for answers to fundamental questions about where we came from and what else is out there. Cisco, like this agency, is working to address challenges related to how we can expand technology, create solutions for industries,…

Read More

The Power of Predictive Networks

The Power of Predictive Networks

If you’re reacting, then you’re already too late. The engineering road, from reactive operations to predictive operations, has been challenging and full of obstacles. But never has it been more needed. As the Internet shifts and evolves, the speed, cost, and quality of digital experiences hang in the balance. Increases in applications running on hybrid and multicloud architectures, complexity of multi-location data centers, together with hybrid work and other digital initiatives can test the Internet…

Read More

Dept of Energy releases C2M2 version 2.1 for energy cybersecurity

Dept of Energy releases C2M2 version 2.1 for energy cybersecurity

Dept of Energy releases C2M2 version 2.1 for energy cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Big data and smart cities: How to battle the pandemic while preserving privacy

Big data and smart cities: How to battle the pandemic while preserving privacy

Big data and smart cities: How to battle the pandemic while preserving privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Flexential – Providing Enterprises with the Interconnected Data Center and Hybrid Cloud Solutions They Need

Flexential – Providing Enterprises with the Interconnected Data Center and Hybrid Cloud Solutions They Need

The pace of business is accelerating. Enterprises today require the robust networks and infrastructure required to effectively manage and protect an ever-increasing volume of data. They must also deliver the speed and low-latency great customer experiences require in an era marked by dramatic innovations in edge computing, artificial intelligence, machine learning, the Internet of Things, unified communications, and other singular computing trends now synonymous with business success. We recently caught up with Mike Fuhrman, Chief…

Read More

Barracuda report: Almost everyone faced an industrial attack in the last year

Barracuda report: Almost everyone faced an industrial attack in the last year

A report commissioned by cloud security company Barracuda found that 94% of respondents have experienced some form of attack on their industrial IoT (IIoT) or operational technology (OT) systems during the last 12 months. The State of Industrial Security in 2022 report surveyed 800 senior IT and security officers responsible for these industrial systems. “In the current threat landscape, critical infrastructure is an attractive target for cybercriminals, but unfortunately IIoT/OT security projects often take a…

Read More

Digital forensics technology can help support cyber investigations, incident response

Digital forensics technology can help support cyber investigations, incident response

Digital forensic technology can help support cyber investigations, incident response | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How Cisco is pursuing social justice through supplier diversity

How Cisco is pursuing social justice through supplier diversity

This post is guest authored by Bryan Wiggins, Supplier Diversity Leader, Global Procurement Services at Cisco. He is an Execution Owner of Cisco’s Social Justice Action 7, Supplier Engagement. Bryan has a nearly 20-year career with Cisco and is a US Army Veteran. Bryan Wiggins, Supplier Diversity Leader, Global Procurement Services at Cisco Seven years ago, I heard Cisco’s chief procurement officer, Alexandra Lopez, was making a visit to Hampton Roads, Virginia, to meet with…

Read More

Optics for hyperscale data centers (Part 3 of 4): Cisco Optics Podcast Episode 27 notes

Optics for hyperscale data centers (Part 3 of 4): Cisco Optics Podcast Episode 27 notes

Episode 27 of the Cisco Optics Podcast is now posted! See below for episode notes. Cisco Optics Podcast Episode 27 Optics for hyperscale data centers, with Ron Horan. Part 3 of 4. The rise of hyperscale data centers has upended computing and networking equipment business models over the past several years. The pluggable optics industry is no exception and has been impacted significantly. In Episode 27, we continue our second conversation with Ron Horan, Cisco…

Read More

Tenable Introduces Nessus Expert with External Attack Surface Management and Cloud Security Capabilities

Tenable Introduces Nessus Expert with External Attack Surface Management and Cloud Security Capabilities

Provides complete visibility across modern attack surfaces Tenable®, the Cyber Exposure company, today announced the addition of Nessus® Expert to its portfolio of trusted vulnerability assessment solutions, giving security consultants, pen testers and security practitioners extended external capabilities and expanded visibility into cloud native environments. External assets and cloud configurations represent two of the biggest cyber risks facing organizations today. Most enterprises lack good accounting of their external footprint, which is easily exploitable by cybercriminals…

Read More
1 2,842 2,843 2,844 2,845 2,846 4,069