SmartNICs set to infiltrate enterprise networks

SmartNICs set to infiltrate enterprise networks

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components–the smartNIC or data processing unit (DPU). Use of smartNICs in the enterprise is still evolvinging, but the idea behind them–offloading server CPU duties onto a separate device to free up server cycles–is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in…

Read More

SmartNICs set to infiltrate enterprise network, security worlds

SmartNICs set to infiltrate enterprise networks

Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components–the smartNIC or data processing unit (DPU). Use of smartNICs in the enterprise is still evolvinging, but the idea behind them–offloading server CPU duties onto a separate device to free up server cycles–is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in…

Read More

The Power of BOLD: Innovative Partnerships – Cisco Blogs

The Power of BOLD: Innovative Partnerships – Cisco Blogs

Co-authored by: Alex Pujols, Director of Systems Engineering, Cisco  Our Partners make everything possible, especially when it comes to innovation. This past year, our conversations with our partner community have been focused on how we can innovate in many areas, from evolving routes to market to the important role of developers to cross-architecture opportunities. We need bold innovation. From Cisco’s Global Systems Engineering teams to our Emerging Technologies & Incubation team, we are putting our collective expertise…

Read More

WFH security: How to protect your remote endpoints from vulnerabilities

WFH security: How to protect your remote endpoints from vulnerabilities

Many organizations lack an effective patch management program, especially when it comes to patching remote systems, says Action1. Image: iStock/ cyano66 Patch management is one of the trickiest but most essential tasks you can take to protect your software, systems and other assets. Cybercriminals know that organizations often fail to properly or quickly patch known vulnerabilities, leaving this a key vector for attack. Patching security holes has become even more difficult with the advent of…

Read More

The rise of millionaire zero-day exploit markets

The rise of millionaire zero-day exploit markets

Researchers detailed the multi-millionaire market of zero-day exploits, a parallel economy that is fueling the threat landscape. Zero-day exploits are essential weapons in the arsenal of nation-state actors and cybercrime groups. The increased demand for exploits is fueling a millionaire market where these malicious codes are incredibly expensive. Researchers from Digital Shadows published an interesting research titled “Vulnerability Intelligence: Do you know where your flaws are?” that shed the light on how the vulnerability criminal industry…

Read More

CISA Office for Bombing Prevention provides counter-IED training

CISA Office for Bombing Prevention provides counter-IED training

CISA Office for Bombing Prevention provides counter-IED training | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Meet Ryan from Cisco’s customer advocacy community – Cisco Blogs

Meet Ryan from Cisco’s customer advocacy community – Cisco Blogs

Our customers are the heart and soul of everything we do at Cisco and each one of them has an interesting story to tell! Our Q&A series allows us to shine a spotlight on some of our most passionate customer advocates in The Global Gateway community as we learn more about their stories and backgrounds. You may be wondering: What is The Global Gateway? It’s a community for Cisco customers where they can build powerful…

Read More

Black Hat Europe 2021 Network Operations Center: London called, We answered – Cisco Blogs

Black Hat Europe 2021 Network Operations Center: London called, We answered – Cisco Blogs

It was so amazing to return to London for the Black Hat Europe 2021 Network Operations Center (NOC). Produced by Informa Tech, and built by the security partners, the mission of the NOC is to quickly build a conference network that is secure, stable and accessible for the briefings, sponsors and attendees. It is a team effort, where collaboration combines a robust backbone (Gigamon), firewall protection (Palo Alto Networks), segmented wireless network (Commscope Ruckus) and…

Read More

Cisco Security Heroes: The power of partnerships, employee education, and zero trust policies – Cisco Blogs

Cisco Security Heroes: The power of partnerships, employee education, and zero trust policies – Cisco Blogs

Today’s cybersecurity universe shares many similarities with the Marvel Universe. There’s bad guys (those pesky cyber-attackers) and there’s good guys, like cybersecurity thought leader Mark Lynd, and Enric Cuixeres Saez, Head of IT at Leng-d’Or. In a recent video, Mark and Enric sat down to discuss the latest dangers and developments in the ever-evolving world of cybersecurity – and it’s an absolute must-watch! But to expand on the conversation and share more of his experiences…

Read More

Simplify Network Security with Cisco Secure Firewall-as-a-service (FWaaS) on AWS – Cisco Blogs

Simplify Network Security with Cisco Secure Firewall-as-a-service (FWaaS) on AWS – Cisco Blogs

Introduction With traditional firewalls, network security teams are charged with the heavy lifting of deploying new solutions. They are responsible for a variety of costs, including licensing, appliance, related infrastructure updates, and ongoing maintenance. From a time-value perspective, inserting firewalls also creates additional complexity for NetOps and SecOps teams, delaying time to deployment in production environments due to design and testing required to integrate the new firewall into the network. To become more agile, organizations…

Read More
1 3,272 3,273 3,274 3,275 3,276 3,919