Farewell: 13 Lessons I’ve Learned in 13 Years at Cisco

Farewell: 13 Lessons I’ve Learned in 13 Years at Cisco

Cisco Blogs / Analytics & Intelligent Automation / Farewell: 13 Lessons I’ve Learned in 13 Years at Cisco Exactly 13 years ago, I began a 6-month contract at Cisco. I had no expectations and only one hope- to learn. Looking back, I’m reminded of the many lessons I’ve learned in my 13-year tenure, and am profoundly grateful for the people and experiences who served as my teachers: Invest time in getting to know yourself– your…

Read More

CIS Control 16 Application Software Security | The State of Security

CIS Control 16 Application Software Security | The State of Security

The way in which we interact with applications has changed dramatically over years. Enterprises use applications in day-to-day operations to manage their most sensitive data and control access to system resources. Instead of traversing a labyrinth of networks and systems, attackers today see an opening to turn an organizations applications against it to bypass network security controls and compromise sensitive data. Key Take Ways for Control 16 Implementation of Secure Software Development Framework (SSDF) Using…

Read More

General Motors speeds innovation in electric and autonomous vehicles with Cisco Ultra-Reliable Wireless Backhaul

General Motors speeds innovation in electric and autonomous vehicles with Cisco Ultra-Reliable Wireless Backhaul

While it sounds futuristic to jump into your self-driving car and take a nap, tackle some work, or simply admire the view out the window, autonomous vehicles are increasingly becoming a reality. Autonomous and electric vehicles will lead to a safer, less congested future for all. General Motors is striving to make this vision a reality, and to get there, every minute counts. Today, we announced that General Motors is the first automaker to deploy…

Read More

How Companies Can Protect the Country from Acts Of Cyberwarfare

How Companies Can Protect the Country from Acts Of Cyberwarfare

By Matt Lindley, CISO and COO, NINJIO Immediately before the Russian invasion of Ukraine, a form of “wiper” malware targeted the government and financial institutions across the country. Almost two weeks earlier, Ukraine’s defense ministry, army, and two major banks were hit with the largest distributed denial-of-service (DDoS) in the country’s history. While Russia hasn’t yet launched a full-scale cyber onslaught against the country, it’s clear that cyberattacks will be a significant element of this…

Read More

Cryptomining Overview for DevOps

Cryptomining Overview for DevOps

What is cryptomining? Malicious cryptomining or cryptocurrency-mining is when cybercriminals exploit unpatched vulnerabilities, weak credentials, or misconfigurations to enter systems and utilize its computer power to generate cryptocurrency. DevOps and cryptomining While ransomware seems to be the hot topic, cryptomining is still a cyberattack with dire consequences. Remember Apache Log4j (Log4Shell)—to be honest, who can forget? This critical vulnerability was mostly observed in the wild in cryptomining attacks. Think of the uptick in cryptomining like…

Read More

CIO Profile: Abhijit Mazumder of TCS on career evolution

CIO Profile: Abhijit Mazumder of TCS on career evolution

Abhijit Mazumder started his career with a small manufacturing company called Wesman in Calcutta. After working as an intern at Tata Group during his college days, he then moved to TCS as a consultant and has been there for the last 27 years. “The first couple of years I spent doing what today we would call ERP projects,” says Mazumder. He now wears multiple hats at TCS: CIO, head of the Ultimatix business unit, and…

Read More

Basing network security on IP addressing: Would it be worth it?

Basing network security on IP addressing: Would it be worth it?

Why is it that over 90% of enterprises tell me that they expect to spend more on security over the next three years, and almost 60% say they expect to spend less on networking? We obviously think that network technology is getting more efficient, more competitive. Why isn’t that the case for security? The short answer is that enterprises have been chasing acronyms and not solutions. Acronym-chasing comes about because by nature, security is hard…

Read More

IP addressing could support effective network security, but would it be worth it?

Basing network security on IP addressing: Would it be worth it?

Why is it that over 90% of enterprises tell me that they expect to spend more on security over the next three years, and almost 60% say they expect to spend less on networking? We obviously think that network technology is getting more efficient, more competitive. Why isn’t that the case for security? The short answer is that enterprises have been chasing acronyms and not solutions. Acronym-chasing comes about because by nature, security is hard…

Read More

Emerging tech deployment by African financial services faces hurdles

Emerging tech deployment by  African financial services faces hurdles

Africa has come a long way in developing new digital payment and banking services, mainly thanks to mobile money products, and the new offerings have helped alleviate problems related to financial exclusion — many people on the continent still do not have traditional bank accounts. Some experts, however, believe that there has not been enough innovation and deployment of emerging technology to expand digital finance beyond basic withdrawals and deposits. While there has been some…

Read More
1 3,113 3,114 3,115 3,116 3,117 4,118