Sustainability in Mining – Cisco Blogs

Sustainability in Mining – Cisco Blogs

In order to meet United Nations sustainability goals, every major mining company has indicated their businesses will change in the next 20 years. The world is about to go through one of the biggest energy transitions in history and it’s clear that the mining industry will be greatly impacted. What can we expect? What are the energy transition strategies? Let’s break it down. Each mining company has a slightly different approach to reaching the sought-after…

Read More

Are Endpoints at Risk for Log4Shell Attacks

Are Endpoints at Risk for Log4Shell Attacks

The end of 2021 saw the emergence of the Log4Shell (CVE-2021-44228) vulnerability, a critical vulnerability in the ubiquitous Java logging package Apache Log4j. Exploiting Log4Shell via crafted log messages can  allow an attacker to execute code on remote machines. The potential impact of this vulnerability is great enough that it scores a 10.0 rating based on CVSS version 3.x and a 9.3  rating based on CVSS version 2.0 in terms of critical risk — and…

Read More

It’s About Time: The Unappreciated Fundamental Metric for Security

It’s About Time: The Unappreciated Fundamental Metric for Security

By Winn Schwartau During the Cold War, the US defended us poor, soon-to-be-nuked citizenry, with time. If the Soviets got it into their heads to send over a six-pack of MIRV, the US had somewhere in the vicinity of 18-22 minutes to launch our thermonuclear response over the pole. The point wasn’t to defend we the citizens; it was to kill as many of their comrades as we could in response. The 18-minute window was…

Read More

StayHackFree – Don’t Be Barry

StayHackFree – Don’t Be Barry

The Holiday call from a buddy you do not want to get – much less make. By James Gorman, CISO, Authx Friday the week before Thanksgiving, driving home for the weekend – watching the late stages of the gorgeous sunset over the mountains of western Maryland. Phone rings – make sure it is on Bluetooth to safely take it in my truck (and adhere to Maryland’s hands-free phone law). I think, “Cool, it is my…

Read More

CVE-2021-44228, CVE-2021-45046, CVE-2021-4104: Frequently Asked Questions About Log4Shell and Associated Vulnerabilities

CVE-2021-44228, CVE-2021-45046, CVE-2021-4104: Frequently Asked Questions About Log4Shell and Associated Vulnerabilities

A list of frequently asked questions related to Log4Shell and associated vulnerabilities. Background Following the discovery of the Apache Log4j vulnerability known as Log4Shell on December 9, The Security Response Team has put together the following blog post to answer some of the more frequently asked questions (FAQ) about Log4Shell and the newly disclosed vulnerabilities in Log4j. FAQ What is Log4j? Log4j is a widely used Java logging library included in Apache Logging Services. It…

Read More

IT Modernization: Why Old Solutions Can’t Secure Today’s Environments

IT Modernization: Why Old Solutions Can’t Secure Today’s Environments

There’s a simple reason why organizations have recently experienced so many new vulnerabilities and breaches. Over the past year, organizations transformed their endpoint environment, and yet they continue to manage and secure their new environments using legacy tools designed for legacy environments. What’s changed in the modern endpoint environment Historically, endpoint environments were relatively small, static, and predictable. They were filled with endpoints that were provisioned by IT and which lived on-premises. But over the…

Read More

Improving Cybersecurity is Everyone’s Job

Improving Cybersecurity is Everyone’s Job

Consumer security awareness is on the rise in America. We should be grateful for that because apathy has a habit of breeding bad outcomes — for businesses, governments, and individuals. But public engagement is still not where it should be. Only one-third of Americans said defending against cyberattacks should be a top priority for the federal government in 2021, for example. When poor security is now costing lives, interrupting food supply chains, driving up the…

Read More

Neuberger: Change Your Passwords Now

Neuberger: Change Your Passwords Now

Cybersecurity official Anne Neuberger has implored American businesses to actively prepare for a seasonal surge in cybercrime. In a statement issued through the White House on Thursday, the deputy assistant to the president and deputy national security advisor for cyber and emerging technology explained why threat actors like to time their attacks with the holidays.  “Historically we have seen breaches around national holidays because criminals know that security operations centers are often short-staffed, delaying the discovery of intrusions,” said…

Read More

Ole Miss Students Charged with Cyber-stalking

Ole Miss Students Charged with Cyber-stalking

Seven students at the University of Mississippi have been charged with cyber-stalking a fellow student who blew the whistle on their fraternity’s hazing activities.  College hazing is an initiation ceremony in which freshmen undertake humiliating and sometimes dangerous feats to gain admittance into a fraternity or sorority. Ole Miss Pi Kappa Alpha fraternity members Baylor Reynolds, aged 19; Christian Parten, 20; Cole Goretski, 20; Miles Baker, 19; Peyton Newcomb, 20; Walker Holden, 19; and Wyatt Johnson, 20,…

Read More

Getting (and keeping) NLP models safely in production

Getting (and keeping) NLP models safely in production

Getting natural language processing (NLP) models into production is a lot like buying a car. In both cases, you set your parameters for your desired outcome, test several approaches, likely retest them, and the minute you drive off the lot, value starts to plummet. Like having a car, having NLP or AI-enabled products has many benefits, but the maintenance never stops — at least to function properly over time, it shouldn’t. While productionizing AI is…

Read More
1 3,129 3,130 3,131 3,132 3,133 3,832