Overcoming the Roadblocks to Successful Infrastructure Modernization

Overcoming the Roadblocks to Successful Infrastructure Modernization

Every CIO is acutely aware that their IT infrastructure now underpins the success of the business. Scalable, integrated compute, network, and data platforms are the prerequisites to delivering exceptional experiences for customers and staff. The challenge now? For IT to design a modern, cloud-first infrastructure that is integrated, secure and software-driven, all while ‘keeping the lights on’ for the company’s existing business processes. Why organizations are turning to cloud-first Organizations that have successfully implemented a…

Read More

Keys to a successful security awareness program

Keys to a successful security awareness program

<!– Keys to a successful security awareness program | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

ESG’s Report on the Role of XDR in SOC Modernization

ESG’s Report on the Role of XDR in SOC Modernization

Extended Detection and Response, or XDR, the cybersecurity topic that dominated the RSA conference 2022 show floor with multiple vendors, has been getting a lot of attention lately, and for good reason. A connected, unified approach to detection and response promises to give security professionals all the tools and capabilities they need to address the ever-growing attack surface. At Cisco, we wanted to get an independent view of what XDR means to a security operations…

Read More

Taking our Partnerships to a New Level to Win Global SMBs with Webex

Taking our Partnerships to a New Level to Win Global SMBs with Webex

As Service Providers you pioneered the hosted business calling market, using Cisco-developed platforms to provide customers worldwide with secure, reliable, and feature-rich cloud-based communications. Together we have become leaders in business calling with over 30 million users around the world. The new reality of remote and hybrid work has created a massive demand for fully integrated cloud collaboration solutions for businesses of all sizes. Calling is foundational, but messaging, video meetings, content sharing, and team…

Read More

Transform your network operations with the cloud-delivered power of Nexus Cloud

Transform your network operations with the cloud-delivered power of Nexus Cloud

Accelerating digital transformation requires transformation of the core infrastructure as well as the mode of operating the infrastructure. In my recent blog on the evolution of the Cisco Nexus portfolio, I discussed how new high-performance options for the Nexus 9000 portfolio are driving major transformations for enterprises and hybrid cloud infrastructure. In this blog I will delve into details of the new Cisco Nexus Cloud, which gives customers a new way of deploying, managing, and…

Read More

Cybersecurity from the inside out — Guarding against insider threats

Cybersecurity from the inside out — Guarding against insider threats

<!– Cybersecurity from the inside out — Guarding against insider threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

How Cloud is Disrupting IT Operations

How Cloud is Disrupting IT Operations

Fewer than 11% of enterprises in APAC today use a single cloud. Instead, organizations are settling on multi-cloud, hybrid strategy with interoperability between cloud providers. This APAC trend reflects what’s happening globally; 92% of enterprises now have a multi-cloud strategy in place, according to the Flexera 2021 State of the Cloud report. It’s easy to see why most companies are going down this route: it provides maximum flexibility to pick and choose the best capabilities…

Read More

Black Basta ransomware – what you need to know | The State of Security

Black Basta ransomware – what you need to know | The State of Security

What is Black Basta? Black Basta is a relatively new family of ransomware, first discovered in April 2022. Although only active for the past couple of months, the Black Basta ransomware is thought to have already hit almost 50 organisations – first exfiltrating data from targeted companies, and then encrypting files on the firm’s computer systems. Victims have reportedly been hit in countries around the world including the United States, UK, India, Canada, Australia, New…

Read More

SOHO routers used as initial point of compromise in stealth attack campaign

SOHO routers used as initial point of compromise in stealth attack campaign

Image: the_lightwriter/Adobe Stock Black Lotus Labs, a threat intelligence team within Lumen Technologies, has recently exposed a new modus operandi for an attack campaign that went undiscovered for nearly two years. This campaign is highly sophisticated and possibly state-sponsored. One of its most intriguing characteristics is that it targets small office / home office (SOHO) routers as an initial point of compromise, in addition to being particularly stealth. The ZuoRAT attack chain At the beginning…

Read More

“Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

“Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

The key on the cyber battlefield, like on the traditional military battlefield, is understanding that there will indeed be many battles By Shmulik Yehezkel (Colonel, res), Chief Critical Cyber Operations Officer at CYE Security As a cybersecurity professional and a reserve field officer in the Israeli military, I have found many valuable insights on the pages of The Art of War, written by the fifth century Chinese military general Sun Tzu. One particular but often…

Read More
1 2,970 2,971 2,972 2,973 2,974 4,169