Cloud Security Resources and Guidance

Cloud Security Resources and Guidance

This article was coauthored by Dan Maunz and Ryan Morrow, both Security Program Managers in the Security & Trust Organization at Cisco The purpose of this document is to provide the reader with a high-level overview of cloud delivery models, introduce the different deployment scenarios in which cloud services can be operated in, and highlight the risks to an organization when deploying and operating a cloud environment. The final section of this document contains references…

Read More

Azure VMware Solution Attached Services Earn VMware a Microsoft Partner of the Year Finalist Award

Azure VMware Solution Attached Services Earn VMware a Microsoft Partner of the Year Finalist Award

We’re very pleased to announce that VMware has been named a finalist for the 2022 Microsoft Partner of the Year Award in the Migration to Azure category. VMware was chosen from more than 3,900 nominations submitted by a global field of top Microsoft partners for demonstrating excellence in innovative customer solutions based on our attached services that extend and enhance Azure VMware Solution. Azure VMware Solution is a Microsoft Azure service jointly built with VMware…

Read More

Meet Joacim from Cisco Insider Advocates

Meet Joacim from Cisco Insider Advocates

Our customers are the heart and soul of everything we do at Cisco and each one of them has an interesting story to tell! Our Q&A series allows us to shine a spotlight on some of our most passionate customer advocates as we learn more about their stories and backgrounds. Cisco’s advocacy community, Cisco Insider Advocates, brings our customers together and provides a way for them to make powerful connections, expand their professional and personal…

Read More

IDC: 4 cloud investment predictions

IDC: 4 cloud investment predictions

As cloud adoption has continued to rise in recent years in response to businesses’ need for agility, cost savings, innovation, and digital transformation, organizations are faced with new challenges and opportunities that impact business operations. Presenting at CIO’s recent Future of Cloud event, Dave McCarthy, research vice president, cloud infrastructure services at IDC, shared IDC’s worldwide cloud predictions for 2022, focusing on four predictions that he believes will be significant for companies in the next…

Read More

Chinese Influence Op Seeks to Undermine Western Rare Earth Firms

Chinese Influence Op Seeks to Undermine Western Rare Earth Firms

Security researchers have uncovered a new Chinese influence operation targeting Western rare earth producers, which could set the tone for future campaigns in other sectors. The Dragonbridge campaign has been operating since 2019, using a network of thousands of inauthentic accounts on multiple social media platforms, websites and forums to promote Chinese interests abroad. However, Mandiant claimed the latest developments warrant closer scrutiny. It used more nuanced tactics than those normally seen in Chinese influence operations in…

Read More

Penetration Testing in 2022: Key Trends and Challenges

Penetration Testing in 2022: Key Trends and Challenges

Just when you thought that we couldn’t be any more integrated with (and dependent on) technology, the Covid pandemic swooped in to prove otherwise. The rise in the use of applications and devices to perform even basic functions pushed companies and end-users to keep pace. Of course, one group of people always seem to be ready: cybercriminals. Cyber attacks are steeply increasing, and attackers are cunning, always finding new ways to get what they want….

Read More

How to keep cybercriminals off university campuses

How to keep cybercriminals off university campuses

<!– How to keep cybercriminals off university campuses | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Role of IAM in Maintaining Cloud Security | The State of Security

The Role of IAM in Maintaining Cloud Security | The State of Security

Cloud computing is an effective solution for large and small companies across every industry. There has been rapid adoption due in large part to its accessibility, flexibility, and reliability. The cloud environment brings a significant amount of benefits, but at the same time, it can expose businesses to various alarming cybersecurity risks. A study conducted by Thales and 451 Research revealed that 40% of respondents have experienced a data breach within their cloud environments. In…

Read More

The four pillars of optimised enterprise computing

The four pillars of optimised enterprise computing

The world has become far more complicated. For businesses, the need to balance employee safety, changed expectations about how and where we work and the changing threat landscape have changed the very nature of how we use our computers. While users have always wanted safe, reliable and high performing PCs and notebooks, delivering that in the post-pandemic world is harder than ever before. And with workplaces and teams distributed more widely than ever before, manageability…

Read More

Share Your Cloud Risk Management Assessment Plan with the Board

Share Your Cloud Risk Management Assessment Plan with the Board

Quantifying and qualifying cyber risk is a longstanding challenge for CISOs. It was already a challenge for on-premise infrastructure when you knew what assets you had and where all the data lived. Cloud migration raises the bar, making it even more challenging to pinpoint cyber risk with a growing digital attack surface composed of distributed infrastructure and independently managed cloud resources used across the company. To help empower CISOs to more succinctly present their cloud…

Read More
1 2,985 2,986 2,987 2,988 2,989 4,179