Simprints: Using touchless biometrics to facilitate access to healthcare – Cisco Blogs

Simprints: Using touchless biometrics to facilitate access to healthcare – Cisco Blogs

We have created a new blog series that will focus on how our nonprofit grant recipients are using Transformational Tech. Each blog in this series will highlight a different nonprofit partner using technology to help transform the lives of individuals and communities. When it comes to healthcare, showing proof of identity is an essential step in accessing life-saving services. Many of us may take for granted being able to reach for our wallet and sharing…

Read More

Around the World from My Home Office – Cisco Blogs

Around the World from My Home Office – Cisco Blogs

I am ready for the day my grandkids ask me what it was like to live during the year 2020. I will tell them of the many cancellations I experienced, like how I missed my classes, my college graduation, and (maybe most disappointingly) a European vacation with my best friends. Although I will have many cancellations to tell them about, my experience as a new hire in Cisco’s Customer Experience Academy (CXA) won’t be one…

Read More

From a Submarine to Cybersecurity: Tripwire Expands in Europe

From a Submarine to Cybersecurity: Tripwire Expands in Europe

In the last few years, Tripwire has increased its portfolio to include industries that were previously overlooked in the cybersecurity space. Industrial organizations are the newest targets for some of the most malicious instances of cybercrime in recent memory. Fortunately, we have a team of sales engineers who have unique experiences in this area. Markus Bloem joined me for a short conversation about his odyssey and his current role at Tripwire. His journey starts in a most unique environment…

Read More

Tokyo 2020 Olympics must be extra secure to avoid cyberattacks and ransomware

Tokyo 2020 Olympics must be extra secure to avoid cyberattacks and ransomware

Any big event is likely to attract bad actors. Keeping the games safe from attack is a huge undertaking for event planners. TechRepublic’s Karen Roby spoke with Ray Canzanese, director of threat research at Netskope, about cybersecurity and the Tokyo 2020 Olympics, being held July 23-Aug. 8, 2021. The following is an edited transcript of their conversation. Karen Roby: I think more and more people are becoming aware now of the problems with cybersecurity and…

Read More

Kaspersky: LuminousMoth spearphishing campaign hit 1,500 targets in Asia

Kaspersky: LuminousMoth spearphishing campaign hit 1,500 targets in Asia

Security researchers think HoneyMyte is behind the advanced persistent threat that has mostly targeted government entities. Image: iStock/jauhari1 Security researchers at Kaspersky have identified a widespread cyberespionage campaign that targets government offices in Asia; the cybersecurity attack starts with a spearphishing email. The security experts have identified 100 victims in Myanmar and 1,400 in the Philippines. Kaspersky analysts explained the LuminousMoth attack on the SecureList blog and suggested that the lopsided numbers between the two…

Read More

CVE-2021-35211: SolarWinds Serv-U Managed File Transfer Zero-Day Vulnerability Exploited in Targeted Attacks

CVE-2021-35211: SolarWinds Serv-U Managed File Transfer Zero-Day Vulnerability Exploited in Targeted Attacks

Following a patch for a zero-day vulnerability in SolarWinds’ Serv-U Managed File Transfer, researchers share new details about the attacks, as over 8,000 systems remain publicly accessible and potentially vulnerable. Background On July 9, SolarWinds published a security advisory for a significant security vulnerability in its Serv-U Managed File Transfer Server software, used for secure file transfers and file sharing. CVE Description CVSSv3 CVE-2021-35211 …

Read More

IoT projects demand new skills from IT project managers

IoT projects demand new skills from IT project managers

If you think regular IT project managers can run IoT projects, you might be miscalculating. Here’s why. Image: Metamorworks/iStockPhoto In June 2021, the State of Indiana rolled out a project management framework that was specifically designed for the Internet of Things. Other IoT PM programs are likely to follow because running an IoT project is different than running a standard IT project, and new skills must be learned SEE: Edge computing adoption to increase through…

Read More

Cloud disaster recovery using native, on-prem VMs

Cloud disaster recovery using native, on-prem VMs

Disaster recovery (DR) has long been a fraught issue for IT. While everyone agrees that it’s necessary to have a plan in place, traditional approaches to disaster recovery are expensive, complex, and unreliable. Some might argue that the solution isn’t much of an improvement on the problem itself. That’s because data center failover touches many different components—from applications and servers to networking and storage—which makes it a complex and manual process. Testing and updating data center disaster recovery plans can also consume a lot of IT’s time and resources.  But disaster recovery in the cloud…

Read More
1 3,275 3,276 3,277 3,278 3,279 3,606