Who is selling Zero Trust Network Access (ZTNA) and what do you get?

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

Enterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties. Much of this interest has stemmed from organizations looking to replace VPNs as the primary remote access mechanism to their networks and data. But it is also being driven by organizations seeking to bolster security in an environment where enterprise…

Read More

Connecting to your Linux system with your Android phone

Connecting to your Linux system with your Android phone

While using your cell phone to connect to your Linux system might not seem like much of a priority, it is possible and you might have a good reason to do this from time to time. If you have an Android cell phone, you can install a tool that will allow you to connect, open a terminal session on your Linux box and run commands just like you would if you were sitting in front…

Read More

The do’s and don’ts of negotiating a raise

The do’s and don’ts of negotiating a raise

These are turbulent times. More than 40 million people left their jobs last year. And they did not sail off into the sunset and disappear from the workforce. They got better jobs. Nowhere is this truer than in technology, where keeping a tech team staffed has become a serious challenge. Unemployment in technology is at 1.3%, one third the already low levels of other industries. Recruiting and retention are not only on your mind, but…

Read More

The Rise of the Enterprise Developer

The Rise of the Enterprise Developer

There are many different types of software developers in today’s industry. We are often segmented in what our tasks are. Mobile, web, front-end, back-end, are just a few examples. Another way to think of developers is the size, scale, and complexity of the applications we apply our craft to. Each day that passes, it seems as if more applications are being required to cover integrated tasks, from sales, to inventory, to accounting, to human resource…

Read More

Advances in Cisco Cloud and Compute Technology Solve Challenges for Insurance Companies

Advances in Cisco Cloud and Compute Technology Solve Challenges for Insurance Companies

This second blog in my financial services blog series is focused on the insurance industry, and how recent trends in predictive analytics, along with advanced storage capabilities, ensure that insurance companies have the data processing power and scalability they need to launch new offerings and keep happy and loyal subscribers. According to a PBS historical documentary, in 1751 Benjamin Franklin created the first organized insurance company called Philadelphia Contributor-ship to offer fire insurance. Today, insurance companies…

Read More

Follina abuses Microsoft Office to execute remote code

Follina abuses Microsoft Office to execute remote code

A vulnerability dubbed “Follina” could allow attackers to gain full system control of affected systems. Learn more about it and how to protect yourself from it, Image: Adobe Stock CVE-2022-30190, also known as “Follina”, is a remote code execution (RCE) vulnerability that affects Microsoft Office, reported on May 27, 2022. How can Follina vulnerability be exploited by attackers? Must-read security coverage The way it goes is as follows: A Microsoft Office .DOC file crafted by…

Read More

Turbulent Cyber Insurance Market Sees Rising Prices and Sinking Coverage

Turbulent Cyber Insurance Market Sees Rising Prices and Sinking Coverage

Chaos reigns in the cyber insurance market. Brokers and cyber insurance carriers — the companies that actually offer the policies — are tightening requirements on what applicants need to do to obtain policies due to losses the insurers have suffered from ransomware coverage. During the past year, premiums grew 18% in the first quarter of 2021 and were up 34% in the fourth quarter of 2021, according to Jess Burn, senior analyst at Forrester. ….

Read More

Seniors: How to Keep Your Retirement Safe from Online Scams | McAfee Blog

Seniors: How to Keep Your Retirement Safe from Online Scams | McAfee Blog

The growing number of internet crimes targeting senior adults is mind-blowing.  In 2021, more than 92,000 people over the age of 60 reported losses of $1.7 billion, according to IC3, the FBI’s Internet Crime division. That number reflects a 74 percent increase in losses from 2020.   These numbers tell us a few things. They tell us that scamming the elderly is a multi-billion-dollar business for cybercriminals. It also tells us that regardless of how shoddy…

Read More

AI, predictive analytics top list of hot technologies for banks

AI, predictive analytics top list of hot technologies for banks

Artificial intelligence, machine learning (a subset of AI), and predictive analytics top the list of hot, planned technology investments for banks in 2022, due to their ability to aid strategic business decision-making, help build applications that can serve customers in a personalized manner, and drive revenue growth, according to market research firm Forrester. Hot technologies for banks also include 5G, natural language processing (NLP), microservices architecture, and computer vision, according to Forrester’s recent Top Emerging…

Read More

Non-human Resources

Non-human Resources

How to close the weakest link in your cyber defenses By Camellia Chan, CEO, and Founder of X-PHY a Flexxon brand Every cyber security professional knows that human error is the common factor behind the majority of successful cyber breaches. Software patches that are not updated, thoughtless clicking on phishing emails, tweaks to software configurations, or ‘personalized’ re-settings of anti-virus software are all too often the innocuous start of a cascading, expensive, and reputation-damaging security…

Read More
1 3,059 3,060 3,061 3,062 3,063 4,182