How companies face risk to security operations derived from the Ukrainian crisis

How companies face risk to security operations derived from the Ukrainian crisis

How companies face risk to security operations derived from the Ukrainian crisis | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cisco Cloud Native Security – Part 4: Security Analytics and Threat Detection Cisco Cloud Native Security – Part 4: Security Analytics and Threat Detection

Cisco Cloud Native Security – Part 4: Security Analytics and Threat Detection Cisco Cloud Native Security – Part 4: Security Analytics and Threat Detection

In this blog post we will discuss how to add visibility, threat detection, security analytics, and alerting inside of your Kubernetes cluster using Cisco Secure Cloud Analytics (formerly known as Stealthwatch Cloud). This is the fourth blog post in a series. In case you have missed the first three parts, you can check them out here: At the bottom of this blog post, we have a demo video that walks through everything discussed in this…

Read More

You Can’t Fix What You Can’t See

You Can’t Fix What You Can’t See

As my grandpa used to say, “You can’t fix what you can’t see ”which is true of most things these days —including employees returning to work. How do you know about their environment, their experience, and their security if you lack the visibility to know what’s going on? From networking, security, and the physical environment itself, there is a lot to consider. And as the world continues to change, we can leverage data to make…

Read More

The ins and outs of cyber insurance

The ins and outs of cyber insurance

The ins and outs of cyber insurance | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Listening to student voices on K-12 school safety

Listening to student voices on K-12 school safety

Listening to student voices on K-12 school safety | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Electric vehicles are taking over. Hackers are waiting

Electric vehicles are taking over. Hackers are waiting

Electric vehicles are taking over. Hackers are waiting | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Texas launches regional SOC for local cybersecurity support

Texas launches regional SOC for local cybersecurity support

Texas launches regional SOC for local cybersecurity support | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

$625 Million Stolen in Latest Crypto Attack: 5 Tips on How to Use Digital Currency Safely

5 Million Stolen in Latest Crypto Attack: 5 Tips on How to Use Digital Currency Safely

Cryptocurrency is all the rage these days and it doesn’t seem to be slowing down any time soon. As more people dive into the nitty-gritty of what blockchain is, how NFTs are traded, and the difference between Bitcoin and Ethereum, digital currency developers are finding new ways for people to engage with crypto. But as crypto continues to grow and become more profitable, hackers are simultaneously trying to find ways to get their hands on…

Read More

People Behind CSR at Cisco: How the Send IT Back mobile app contributes to a circular economy

People Behind CSR at Cisco: How the Send IT Back mobile app contributes to a circular economy

We have a blog series that focuses on the people behind Corporate Social Responsibility (CSR) at Cisco. Each blog in this series highlights a different Cisco employee who works closely with CSR initiatives across the company. Guided by our goal to help create a circular economy, Cisco is working on making products easier to reuse, refurbish, and recycle and for our customers to return them to us to close the loop. Why is a circular…

Read More

Software and consulting boost IBM results to start the year

Software and consulting boost IBM results to start the year

IBM posted strong revenue numbers to start the year, as CEO Arvind Krishna continues to focus the company on hybrid cloud and AI. This was the first quarter IBM reported results since it spun out its managed infrastructure services business under the new name of Kyndryl. That business still contributed 5% of total revenue growth for the quarter but won’t count against IBM results from October, Krishna told analysts. Revenue for the first quarter of…

Read More
1 3,115 3,116 3,117 3,118 3,119 4,118