A cybersecurity year in review

A cybersecurity year in review

A cybersecurity year in review | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

The evolution of enterprise security since 9/11

The evolution of enterprise security since 9/11

The evolution of enterprise security since 9/11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Is that security job listing real?

Is that security job listing real?

Is that security job listing real? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Is being kind bad for your career? Bah, humbug!

Is being kind bad for your career? Bah, humbug!

Is being kind bad for your career? Bah, humbug! | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

State of Cybersecurity in Germany in 2021 | The State of Security

State of Cybersecurity in Germany in 2021 | The State of Security

According to Germany’s Federal Office for Information Security (BSI), the country faces a grave and growing threat as society becomes more digitally connected and criminals more sophisticated. The BSI said threat levels have reached red alarm levels. Threat level increased BSI published their annual report “The State of IT Security in Germany in 2021.” It highlights that the biggest risks come from malware and ransomware attacks. In fact, the agency detected 144 million new malware…

Read More

Stand der Cybersicherheit in Deutschland 2021 | The State of Security

State of Cybersecurity in Germany in 2021 | The State of Security

Laut Bundesamt für Sicherheit in der Informationstechnik (BSI) ist die Gefährdungslage in Deutschland aufgrund der voranschreitenden Digitalisierung der Gesellschaft und der Komplexität heutiger Cyberangriffe besorgniserregend. Dem BSI zufolge ist die Alarmstufe Rot erreicht. Bedrohungsstufe erhöht Im Jahresbericht des BSI „Die Lage der IT-Sicherheit in Deutschland 2021“ wird hervorgehoben, dass die größte Gefahr von Malware und Ransomware ausgeht. Tatsächlich hat das Amt zwischen Juni 2020 und Ende Mai 2021 144 Millionen neue Malware-Varianten identifiziert. Das entspricht einem…

Read More

APIs pose the latest threat of networking-vendor lock-in

APIs pose the latest threat of networking-vendor lock-in

In my surveys of enterprises, the number worried about vendor lock-in has hovered around 90% for 30 years.  When you ask enterprises how they avoid it, they respond “standard interfaces” or “open-source”. Even today, the percentage who include “managing APIs” in their list of lock-in avoidance measures is in the statistical noise level, but APIs are perhaps the fastest-growing lock-in problem today, and they’re surely going to become a major problem in the future. API…

Read More

FTC investigation of Nvidia/Arm deal will only hurt Arm

FTC investigation of Nvidia/Arm deal will only hurt Arm

The proposed Nvidia-Arm merger had another roadblock thrown in front of it when the US Federal Trade Commission’s filed a lawsuit objecting to the $40 billion deal last week. The acquisition met with almost immediate opposition from UK entities when it was announced in September 2020. Now, 15 months laster the FTC weighs in and has set an administrative trial for Aug. 9, 2022. “Tomorrow’s technologies depend on preserving today’s competitive, cutting-edge chip markets,” said…

Read More

APIs pose the latest threat of vendor-lock-in networking

APIs pose the latest threat of networking-vendor lock-in

In my surveys of enterprises, the number worried about vendor lock-in has hovered around 90% for 30 years.  When you ask enterprises how they avoid it, they respond “standard interfaces” or “open-source”. Even today, the percentage who include “managing APIs” in their list of lock-in avoidance measures is in the statistical noise level, but APIs are perhaps the fastest-growing lock-in problem today, and they’re surely going to become a major problem in the future. API…

Read More

Aryaka broadens enterprise targets with managed SD-WAN, SASE services

Aryaka broadens enterprise targets with managed SD-WAN, SASE services

Aryaka Networks is looking to target more enterprises with a new managed secure access service edge (SASE) offering and an improved, lower cost SD-WAN offerings. Aryaka is known for offering WAN and SD-WAN services over its global Layer 2 network with more than 40 points . The new services spring from that backbone to provide additional, flexible WAN services.  The first is based on a new iteration of Aryaka’s L2 core—the L3—which is optimized for…

Read More
1 3,149 3,150 3,151 3,152 3,153 3,820