Broadcom Software Shows Why Zero Trust is Important Everywhere

Broadcom Software Shows Why Zero Trust is Important Everywhere

By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software Last December, Broadcom Software published our blog: Predictions for 2022. We will now explore each of these in more depth in our next blog series. First up, Zero Trust. Prediction: Zero Trust becomes table stakes Bad actors are stepping up their attacks, and companies have new problems to solve for. For example, with nearly half (47%) of business leaders planning to…

Read More

Palo Alto Networks Named a Leader in Cloud Workload Security Report

Palo Alto Networks Named a Leader in Cloud Workload Security Report

SANTA CLARA, Calif., March 25, 2022 /PRNewswire/ — Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today announced it has been named a Leader in The Forrester Wave™: Cloud Workload Security, Q1 2022 report. Cloud workload security is core to Palo Alto Networks’ strategy to help organizations secure infrastructure, applications and data across hybrid and multicloud environments. According to the Forrester report, “[Palo Alto Networks] offers very strong data sovereignty and high- availability options…

Read More

Overcome Barriers in Manufacturing IT to Advance Digital Transformation – Cisco Blogs

Overcome Barriers in Manufacturing IT to Advance Digital Transformation – Cisco Blogs

The drive for change in manufacturing When thinking about everything that goes into transforming a traditional manufacturing plant into a smart factory of the future, there are several factors that determine its success—or failure. Forbes recently reported up to 84 percent of digital transformation initiatives are likely to fail.1 When trying to determine how to create success, it is easy to focus on the technology and the cost, when often the largest single factor is…

Read More

London DJ Surrenders £214,000 of Music Kit in Money Laundering Case

London DJ Surrenders £214,000 of Music Kit in Money Laundering Case

A London nightclub owner has been forced to surrender hundreds of thousands of pounds worth of equipment seized by police after being linked to a notorious cybercrime money laundering group. The QQAAZZ group provided money-laundering services to many organized cybercrime groups over the years. According to the National Crime Agency (NCA), the transnational gang was managed from London using shell companies, mule accounts and cryptocurrency to hide the origin of cybercrime proceeds. As part of its investigation…

Read More

Four Russians Charged with Dragonfly Attacks on Critical Infrastructure

Four Russians Charged with Dragonfly Attacks on Critical Infrastructure

The US authorities have revealed indictments charging Russian state hackers with carrying out a string of attacks against global energy firms over a six-year period. The first indictment originally returned in June 2021 involves Evgeny Viktorovich Gladkikh, a computer programmer with the State Research Center of the Russian Federation FGUP Central Scientific Research Institute of Chemistry and Mechanics. He reportedly hacked industrial control systems (ICS) and operational technology (OT) between May and September 2017. This…

Read More

UK Teen Arrested in Lapsus Crackdown

UK Teen Arrested in Lapsus Crackdown

British police have arrested several young people in connection with the notorious Lapsus ransom attacks, including one 16-year-old from Oxford thought to be the group’s ringleader. City of London police cuffed seven individuals between the ages of 16 and 21, all of whom have been released under investigation, according to the BBC. It’s unclear if the Oxford teen is among these. However, the individual, known online as “White” or “Breachbase,” apparently has autism and attends…

Read More

How to Fix Mid-Market Security Using Intelligent Automation and AI

How to Fix Mid-Market Security Using Intelligent Automation and AI

By Guy Moskowitz, CEO, Coro Market forces are working against medium-sized businesses, leaving companies that don’t have large, dedicated security teams and fat cyber security budgets exposed to cyber threats. When combined with the global pandemic and the fact that cybercriminals have expanded into mid-market targets, medium-sized companies face greater risk than ever, and it’s time IT leaders and the industry step up to take care of this gap. Three factors have arisen that have…

Read More

What CIO certificate programs can do for your career

What CIO certificate programs can do for your career

If you’ve been recently promoted into the CIO role, or hope to be at some point, a CIO management-certificate program can help you learn how to think strategically, approach the job systematically and broadly, and communicate effectively with other executives in the C-suite. And they can help you resolve issues you may be grappling with in your own company. Another big benefit, depending on the program: The opportunity to build your network of high-powered CIOs…

Read More

Paul Martin: CIOs don’t retire, they go work on boards

Paul Martin: CIOs don’t retire, they go work on boards

Two years of pandemic uncertainty and escalating business risk have sharpened the focus of corporate boards on a technology trend once dismissed as just another IT buzzword. “Digital transformation work has been greatly accelerated by the pandemic,” says Paul Martin, who wrapped up a decade as CIO of Baxter International in October 2020 and now serves on four public company boards: Unisys, Ping Identity, Owens Corning, and Steris. These days, he adds, “CIOs don’t retire….

Read More

The keys to enabling hybrid work

The keys to enabling hybrid work

Flexible work environments that were precipitated by the pandemic are most certainly here to stay and work will not return to pre-pandemic norms. These days it’s all about what workers do and how they do it, not where they do it. Access to technology dictates where a worker chooses to work.  Providing a consistent experience from just about anywhere is key to hybrid work. Manageable high bandwidth, reliable and secure wireless communications will be one…

Read More
1 3,152 3,153 3,154 3,155 3,156 4,088