Access control helps climate risk management efforts

Access control helps climate risk management efforts

<!– Access control helps climate risk management efforts | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Inspiration Through Stories of Accomplishment

Inspiration Through Stories of Accomplishment

As the Vice President of the Learning and Certifications organization at Cisco, I have the privilege of hearing amazing success stories and stories of people changing their lives and careers via Cisco training and exams. I am able to see, firsthand, how learning, certifications, and being Cisco certified have helped thousands of people in the tech industry transform their careers. At the highest level, Cisco training and certification programs offer a path to the technology…

Read More

Embrace Your Possible, Embrace Digital

Embrace Your Possible, Embrace Digital

We’ve come a long way since our in-person Cisco Live in 2019. Over this time, everything hasn’t always gone as expected, but one thing has become quite clear. Business as we know it will never be the same. Whether it’s how we consume entertainment, move applications or systems to the cloud, or immerse in hybrid work, everything has gone digital. With this huge leap, Cisco is in a unique position to help you embrace digital….

Read More

How to drive telehealth adoption 

How to drive telehealth adoption 

Patients are consumers who expect ease, convenience, and efficiency when accessing healthcare. Today, accessing healthcare services requires more technology than ever.    With the introduction of Electronic Medical Records (EMR) came medical data mobility, unleashing data that could be shared, aggregated, and evaluated. The HITECH act funded the expansion of medical record technology in the USA, and since then, has created mountains of data that, when in the right hands at the right time, could save…

Read More

6 ways to reinvent your IT leadership career

6 ways to reinvent your IT leadership career

In an industry where second chances can be hard to come by, IT leaders who find themselves stuck in jobs with limited flexibility and potential can break free from their current predicaments and get back to building careers rich with satisfaction and growth. The CIO role is undergoing fundamental changes as enterprises alter their expectations for how IT capabilities are deployed, says Elizabeth Ebert, CIO advisory partner at IT services firm Infosys Consulting. “Every CIO…

Read More

Three BEC Suspects Arrested in “Killer Bee” Sting

Three BEC Suspects Arrested in “Killer Bee” Sting

Three Nigerian men have been arrested on suspicion of using malware as part of business email compromise (BEC) attacks on global companies. Interpol revealed that Nigeria’s Economic and Financial Crimes Commission (EFCC) arrested the men in the Lagos suburb of Ajegunle and in Benin City, 300kms from the commercial capital. It was coordinated as part of Interpol’s “Killer Bee” operation involving law enforcement agencies in 11 countries across southeast Asia. It’s funded by the Japan-ASEAN…

Read More

UK Privacy Tsar: Stop Excessive Data Collection from Rape Victims

UK Privacy Tsar: Stop Excessive Data Collection from Rape Victims

The UK’s privacy watchdog has called for an end to excessive data collection from victims of rape and serious sexual assault cases, claiming that it breaches data protection laws. In a strongly worded Commissioner’s Opinion, new information commissioner John Edwards said he expected the practice to stop immediately, while making recommendations on how data should be handled in such cases. “Our investigation reveals an upsetting picture of how victims of rape and serious sexual assault…

Read More

Turkish Airline Exposes Flight and Crew Info in 6.5TB Leak

Turkish Airline Exposes Flight and Crew Info in 6.5TB Leak

A low-cost Turkish airline accidentally leaked personal information of flight crew alongside source code and flight data after misconfiguring an AWS bucket, it has emerged. A research team from security comparison site SafetyDetectives discovered the cloud data store left wide open on February 28. It traced some of the leaked information to Electronic Flight Bag (EFB) software developed by Pegasus Airlines. EFBs are information management tools designed to optimize the productivity of airline crew by providing essential…

Read More

The Comfort of Cisco Secure

The Comfort of Cisco Secure

When I think of the word security, the first thing that comes to mind is my family. My wife, son, and two daughters are my everything. From the moment I first held my children, I became their figurative security blanket. As they have grown into adulthood, I have offered emotional, communication, internet, transportation, food, personal and so many other types of security to them. Security was more than just a word; I took that responsibility…

Read More

Here’s how an IT leader is accelerating healthcare innovation adoption in India

Here’s how an IT leader is accelerating healthcare innovation adoption in India

A plethora of digital health solutions are launched every year in India. However, only a few of them get adopted by doctors. To overcome the bottlenecks and accelerate the adoption of digital healthcare innovation in the country, a top enterprise technology leader has adopted a novel approach. In 2021, Dr Satish Prasad Rath, chief innovation and research officer at Aster DM Healthcare, made a lateral shift in his organization. He joined the company’s medical college…

Read More
1 3,067 3,068 3,069 3,070 3,071 4,179