Taking our Partnerships to a New Level to Win Global SMBs with Webex

Taking our Partnerships to a New Level to Win Global SMBs with Webex

As Service Providers you pioneered the hosted business calling market, using Cisco-developed platforms to provide customers worldwide with secure, reliable, and feature-rich cloud-based communications. Together we have become leaders in business calling with over 30 million users around the world. The new reality of remote and hybrid work has created a massive demand for fully integrated cloud collaboration solutions for businesses of all sizes. Calling is foundational, but messaging, video meetings, content sharing, and team…

Read More

Transform your network operations with the cloud-delivered power of Nexus Cloud

Transform your network operations with the cloud-delivered power of Nexus Cloud

Accelerating digital transformation requires transformation of the core infrastructure as well as the mode of operating the infrastructure. In my recent blog on the evolution of the Cisco Nexus portfolio, I discussed how new high-performance options for the Nexus 9000 portfolio are driving major transformations for enterprises and hybrid cloud infrastructure. In this blog I will delve into details of the new Cisco Nexus Cloud, which gives customers a new way of deploying, managing, and…

Read More

Cybersecurity from the inside out — Guarding against insider threats

Cybersecurity from the inside out — Guarding against insider threats

<!– Cybersecurity from the inside out — Guarding against insider threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How Cloud is Disrupting IT Operations

How Cloud is Disrupting IT Operations

Fewer than 11% of enterprises in APAC today use a single cloud. Instead, organizations are settling on multi-cloud, hybrid strategy with interoperability between cloud providers. This APAC trend reflects what’s happening globally; 92% of enterprises now have a multi-cloud strategy in place, according to the Flexera 2021 State of the Cloud report. It’s easy to see why most companies are going down this route: it provides maximum flexibility to pick and choose the best capabilities…

Read More

Black Basta ransomware – what you need to know | The State of Security

Black Basta ransomware – what you need to know | The State of Security

What is Black Basta? Black Basta is a relatively new family of ransomware, first discovered in April 2022. Although only active for the past couple of months, the Black Basta ransomware is thought to have already hit almost 50 organisations – first exfiltrating data from targeted companies, and then encrypting files on the firm’s computer systems. Victims have reportedly been hit in countries around the world including the United States, UK, India, Canada, Australia, New…

Read More

SOHO routers used as initial point of compromise in stealth attack campaign

SOHO routers used as initial point of compromise in stealth attack campaign

Image: the_lightwriter/Adobe Stock Black Lotus Labs, a threat intelligence team within Lumen Technologies, has recently exposed a new modus operandi for an attack campaign that went undiscovered for nearly two years. This campaign is highly sophisticated and possibly state-sponsored. One of its most intriguing characteristics is that it targets small office / home office (SOHO) routers as an initial point of compromise, in addition to being particularly stealth. The ZuoRAT attack chain At the beginning…

Read More

“Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

“Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

The key on the cyber battlefield, like on the traditional military battlefield, is understanding that there will indeed be many battles By Shmulik Yehezkel (Colonel, res), Chief Critical Cyber Operations Officer at CYE Security As a cybersecurity professional and a reserve field officer in the Israeli military, I have found many valuable insights on the pages of The Art of War, written by the fifth century Chinese military general Sun Tzu. One particular but often…

Read More

What It Takes to Be a Winner in Tech

What It Takes to Be a Winner in Tech

Claire Blythe, VP, global tech and operations at GfK (the AI-powered intelligence platform revolutionizing real-time access to critical knowledge), won Role Model of the Year at Computing’s recent Women in Tech Excellence awards. We ask for her secrets to success in technology leadership, and how women can rapidly advance their careers in the field. What does your role encompass? As the VP of global tech and operations for the Marketing and Consumer Intelligence arm of…

Read More

Get 15 hours of basic cybersecurity education online for just $29

Get 15 hours of basic cybersecurity education online for just

This bundle provides a strong overview of the cybersecurity field. Image: Melinda Nagy/Adobe Stock As cybercriminals get savvier and more technical, the demand for data and IT security grows larger. From crypto scams to data breaches and beyond, individuals and companies alike are always looking for ways to protect their precious digital assets. Whether you’re interested in protecting your own digital life or you might want to pursue a new career in cybersecurity, check out…

Read More

Digital Leadership — Outlook and Trends

Digital Leadership — Outlook and Trends

With a career that spans over four decades, Alex Siow is well-known as Singapore’s first Chief Information Officer in the 1990s. He is the author of Leading with IT: Lessons from Singapore’s First CIO, which is written for the next generation of CIOs, CTOs, and other executives who work closely with technology. It offers practical tips, case studies, and personal insights that shed light on the central competencies required of CIOs. Digital Disruption for Business There…

Read More
1 2,884 2,885 2,886 2,887 2,888 4,082