Synthetic identity fraud: What is it, and why is it harmful?

Synthetic identity fraud: What is it, and why is it harmful?

Online consumers can do everything right and still become cyber victims. Learn about synthetic identity fraud and why “buyer beware” is not enough. Image: Shutterstock/PabloLagart Digital criminals are creating new and effective ways to con businesses and financial institutions by using synthetic identity fraud. They are having enough success that those in the know at McKinsey and Company are more than a little concerned: “By our estimates, synthetic identity fraud is the fastest-growing type of…

Read More

It’s Time for Networks to Join the Agility Revolution

It’s Time for Networks to Join the Agility Revolution

By: James Robertson, Office of the CTO, at Aruba, a Hewlett Packard Enterprise Company When it comes to the modern business, “Virtualize Everything” and the shift to the cloud has become the default strategy. Ultimately, the journey to cloud has been brought on by the need to control costs, reduce footprints, and simplify technology stacks in order to create the agility and flexibility to move towards consumption-based cost models and away from fixed assets. The pandemic has…

Read More

Disabilities Around Us – Turning Awareness into Action – Cisco Blogs

Disabilities Around Us – Turning Awareness into Action – Cisco Blogs

At Cisco, our purpose is to power an inclusive future for all. I truly believe those words – ‘inclusive’ and ‘for all’ – must underpin everything we do at Cisco. Cisco office in Bedfont Lakes (UK) on December 3rd supporting the PurpleLightUp initiative Over 30,000 of Cisco employees participate in Cisco’s inclusive communities—a group of 29 employee resource organizations (EROs) and employee networks that help our people connect within community and among allies. Our inclusive…

Read More

3 Technology Trends in the Future of Government – Cisco Blogs

3 Technology Trends in the Future of Government – Cisco Blogs

Welcome to the first blog in our #SecureGovernment series! Today, we look at the technological trends that are likely to drive the future of government. In recent times, we’ve seen an unprecedented rate of digital transformation in the public sector. While the government is traditionally built for stability and risk-minimization, agility and rapid adoption were imperative to ensure that critical services were kept up and running. With the lessons learned and building blocks in place,…

Read More

Tesla’s distracted driving raises duty of care questions

Tesla’s distracted driving raises duty of care questions

Tesla’s distracted driving raises duty of care questions | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Contact Center Ghosts of Past, Present, and Future: Part 2

The Contact Center Ghosts of Past, Present, and Future: Part 2

In part 2 of this 3-part series we are visited by the Ghost of Contact Centers, Present. Tackling elevated customer frustration levels while lowering the overall temperature during the call process is vital, especially during the holidays. No matter how much automation your organization invests in, the majority of calls must still be processed by subject matter experts. This means callers wait in ever-expanding queues, which can test the patience of even the most forgiving customer….

Read More

Surveillance-for-hire: Are you a target of the booming spy business?

Surveillance-for-hire: Are you a target of the booming spy business?

Meta has exposed and acted against entities that have been spying on people and organizations around the globe. Find out how the threat actors operate and learn what you can do to protect yourself. scyther5, Getty Images/iStockphoto In the shady waters of the internet are swimming several threat actors specialized in running surveillance services. While the most advanced ones are state-sponsored, others are private companies selling offensive services. Behind claims that they are doing only…

Read More

SecureX Wins Again – Cisco Blogs

SecureX Wins Again – Cisco Blogs

Co-authored by Frank Lento It’s the most wonderful time of the year! No, we are not talking about the holiday season (although that is great too). Instead, we are referring to the fact that CRN has announced its 2021 Products of the Year. We are happy to share that Cisco SecureX has won the top spot for Product of the Year in the Cloud Security category for the second year in a row. The CRN…

Read More

IP cameras bolster Belgian retailer’s surveillance system

IP cameras bolster Belgian retailer’s surveillance system

IP cameras bolster Belgian retailer’s surveillance system | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Toward an enlightened micromanagement

Toward an enlightened micromanagement

Toward an enlightened micromanagement | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More
1 3,127 3,128 3,129 3,130 3,131 3,833