The Total Economic Impact™ of Cisco Secure Firewall – Cisco Blogs

The Total Economic Impact™ of Cisco Secure Firewall – Cisco Blogs

This blog has been authored by Forrester Consulting Cisco commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study to examine the value that Secure Firewall customers could achieve by deploying Secure Firewall, Firewall Management Center, and optionally SecureX. We spoke with ten decision-makers from eight customer organizations about the benefits, costs, risks, and flexibility of their investment in these Cisco Security solutions. We used their data and profiles to build a composite organization…

Read More

A Third of UK Businesses Experience Cyber-Attacks at Least Once a Week

A Third of UK Businesses Experience Cyber-Attacks at Least Once a Week

Around a third (31%) of businesses experience cyber-attacks or breaches at least once a week, according to new figures published in the UK government’s Cyber Security Breaches Survey 2022 report. Over a quarter (26%) of charities also reported being hit by attacks at least once a week, and the government is urging all organizations to strengthen their cybersecurity practices in response to the growing threat landscape. The annual survey of UK businesses, charities and education institutions found…

Read More

10 tips for getting started with decision intelligence

10 tips for getting started with decision intelligence

For organizations looking to move beyond stale reports, decision intelligence holds promise, giving them the ability to process large amounts of data with a sophisticated mix of tools such as artificial intelligence and machine learning to transform data dashboards and business analytics into more comprehensive decision support platforms. Successful decision intelligence strategies, however, require an understanding of how organizational decisions are made, as well as a commitment to evaluate outcomes and manage and improve the…

Read More

Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance

Executive Order Instructs Certain Organizations to Improve Their Cybersecurity Stance

Financial Institutions Should Boost Their Efforts to Thwart Cyberattacks By Bob Thibodeaux, Chief Information Security Officer, DefenseStorm Consumer data is one of the most valuable assets for organizations around the world. In fact, it’s been said that consumer data is as good as gold. And like gold, data is a commodity. However, companies profiting by accessing and storing this data have the responsibility to keep it safe. Protecting data has even become a consumer expectation…

Read More

World Backup Day: Simplicity and Patience is Key | The State of Security

World Backup Day: Simplicity and Patience is Key | The State of Security

A few months ago, a popular cybersecurity news organization posted an urgent notice on social media seeking help to recover their data after their blog was deleted.  They announced that they had no backups and they were desperately trying to contact the site administrator to restore their blog collection.  This was as maddening as it was embarrassing for the same reasons.  One would think that a cybersecurity organization would exemplify good backup habits, or that…

Read More

No Cookies – Trust and Compliance in a Cookieless Digital World

No Cookies – Trust and Compliance in a Cookieless Digital World

Originally envisaged as a convenient way to store web data, cookies emerged as a powerful marketing tool in the 2000s. For many years, digital marketers relied on cookies for data collection. However, in recent history, new privacy laws, browser features, and plug-ins have changed the landscape of data collection. Marketers have had to develop tools and strategies to ensure they meet compliance as the internet becomes more and more cookieless. The origins of the cookie…

Read More

What is Bundesamt für Sicherheit in der Informationstechnik (BSI)?

What is Bundesamt für Sicherheit in der Informationstechnik (BSI)?

Have you ever confused your acronyms?  Perhaps you have laughed when someone has had to explain some of the acronyms used in text messages.  Business, and especially technology acronyms are almost as plentiful as text acronyms.  There are few things as embarrassing as being in a business meeting, and mistaking one acronym for another.  This happened recently in a meeting where the acronym “BSI” was not defined in full immediately, and it was especially confusing…

Read More

What is Bundesamtes für Sicherheit in der Informationstechnik (BSI)?

What is Bundesamt für Sicherheit in der Informationstechnik (BSI)?

Have you ever confused your acronyms?  Perhaps you have laughed when someone has had to explain some of the acronyms used in text messages.  Business, and especially technology acronyms are almost as plentiful as text acronyms.  There are few things as embarrassing as being in a business meeting, and mistaking one acronym for another.  This happened recently in a meeting where the acronym “BSI” was not defined in full immediately, and it was especially confusing…

Read More

An In-Depth Look at ICS Vulnerabilities Part 1

An In-Depth Look at ICS Vulnerabilities Part 1

In 2021, there were significant changes in the methods used by cyber attackers. More advanced destructive supply chain attacks also came to the surface this year. This has created an anxious environment, driving developments in cyber defense and the discovery of ICS-related CVEs. 2021’s timeline overview of major OT and ICS cyber incidents shows that modern criminal operations have become so developed that a service industry has emerged with a common business model – Ransom­ware-as-a-Service…

Read More

Troubleshooting puzzle: What caused the streaming to degrade?

Troubleshooting puzzle: What caused the streaming to degrade?

You’ve just been given the task of solving a network problem that has been unresolved for many months. Where do you start? Is it a solvable problem or is it just the way the network works? Maybe you’ve encountered a limitation on how network protocols function. What follows is an account of just such a problem that stumped many good network engineers for months and how it was resolved by NetCraftsmen’s Samuel Bickham. It may…

Read More
1 3,146 3,147 3,148 3,149 3,150 4,092