Managed Services Is Our Market to Win, Together – Cisco Blogs

Managed Services Is Our Market to Win, Together – Cisco Blogs

I recently had to shop for a new dishwasher for the first time in six years.  Wow, how the experience has changed. The selling dynamic has shifted from lengthy discussions about models and capabilities to a tailored conversation about my needs in use and care. At the end of the day, I purchased a plan (with ongoing services) so that my family and I can focus on using the dishwasher in the ways that support…

Read More

#IRISSCON: 12 Ways to Defend and Respond to Cyber-Attacks Effectively

#IRISSCON: 12 Ways to Defend and Respond to Cyber-Attacks Effectively

Best practices to defend and respond to cyber-attacks, drawing on analogies with the COVID-19 pandemic, were set out by Brian Honan, CEO, BH Consulting, during this week’s IRISSCON 2021. Honan began by warning organizations: “What you put in place to defend or secure your network won’t stop the attackers. It will delay the attackers, but a sophisticated attacker will get by your systems eventually, so what you need to do is design your security to delay…

Read More

Policymakers want to regulate AI but lack consensus on how

Policymakers want to regulate AI but lack consensus on how

Commentary: AI is considered “world changing” by policymakers, but it’s unclear how to ensure positive outcomes. Image: iStock/metamorworks According to a new Clifford Chance survey of 1,000 tech policy experts across the United States, U.K., Germany and France, policymakers are concerned about the impact of artificial intelligence, but perhaps not nearly enough. Though policymakers rightly worry about cybersecurity, it’s perhaps too easy to focus on near-term, obvious threats while the longer-term, not-obvious-at-all threats of AI…

Read More

Secure Code Warriors – Final Battle Winners

Secure Code Warriors – Final Battle Winners

We have arrived at the third and final blog post around Secure Code Warrior. In the first two blogs… So, You Can Code… But Can You Write Secure Code? Finding Cisco DevNet Elite Secure Code Warriors … we introduced you to the Secure Code Warrior tournament held during Cisco DevNet Create 2021. In this final blog post, I wanted to report back about the final battle between the crème-de-la-crème – the DevNet Secure Code Warrior…

Read More

How a Global Pandemic Changed the Way We Work, Forever – Cisco Blogs

How a Global Pandemic Changed the Way We Work, Forever – Cisco Blogs

Part of the Hybrid Work Success series: Rethinking a hierarchy of needs in the context of work — how a global pandemic changed the way we work, forever. In a moment of reflection amidst all the pandemic induced change, I find myself asking how we move away from the adrenaline induced reactive motions to more strategic and enlightened thinking.  Perhaps the most radical of changes is the profound shift in work. The workforce, the workplace,…

Read More

VMware Recognized for ESG Leadership with Invitation to Dow Jones Sustainability Indices for 2nd Consecutive Year

VMware Recognized for ESG Leadership with Invitation to Dow Jones Sustainability Indices for 2nd Consecutive Year

News Detail PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced the company has been invited to be a member of the 2021 Dow Jones Sustainability Indices (DJSI), one of the world’s leading environmental, social and governance (ESG) benchmarks, for the second consecutive year. This press release features multimedia. View the full release here: … Fri, 19 Nov 2021 00:00:00 PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced the company has been…

Read More

#IRISSCON: Transition from Cybersecurity to Cyber-Immunity, Says Eugene Kaspersky

#IRISSCON: Transition from Cybersecurity to Cyber-Immunity, Says Eugene Kaspersky

Cyber veteran Eugene Kaspersky outlined the need to transition from cybersecurity to cyber-immunity during a session at this week’s IRISSCON 2021. Kaspersky, CEO of the Russian-headquartered IT security vendor of the same name, said humanity is entering a new stage of its evolution – the cyber age. In this era, we will become increasingly reliant on digital technology, which will offer huge benefits to individuals and society at large. However, there are significant barriers to this…

Read More

Suspected EncroChat Drug Trafficker Faces Trial

Suspected EncroChat Drug Trafficker Faces Trial

A suspected prolific drug trafficker is set to face trial following an international operation to crack a popular encrypted chat network used by criminals, according to the National Crime Agency (NCA). The UK agency for serious and organized crime revealed that 44-year-old Kamran Butt had been extradited to Germany, where he is now remanded in custody of the Bundeskriminalamt (federal police) awaiting trial. A Hamburg judge issued a European arrest warrant for Butt in October 2020. He…

Read More

Malicious PyPl Packages Downloaded 40,000+ Times

Malicious PyPl Packages Downloaded 40,000+ Times

Researchers have discovered 11 new malicious open-source packages using various advanced techniques to avoid detection on the popular PyPl repository. Python’s official third-party software repository is home to over half a million developers, who typically use pre-built open-source packages to accelerate time-to-market. However, threat actors are increasingly infiltrating these upstream sources for their own ends. The JFrog Security research team yesterday revealed it had discovered 11 new malware packages with over 40,000 downloads from PyPl. Their authors…

Read More

Less than Half of Consumers Change Password Post-Breach

Less than Half of Consumers Change Password Post-Breach

There’s a “shockingly high” disconnect between awareness of best practices following a data breach and actions taken, according to a new study from the Identity Theft Resource Center (ITRC). The non-profit polled over 1000 US consumers to gauge their understanding of and response to breach incidents involving personal information. The report found that more than half (55%) of social media users have had their accounts compromised in the past, so there’s generally a high level of awareness about…

Read More
1 3,347 3,348 3,349 3,350 3,351 3,978