Get To Know ThousandEyes – Part 1

Get To Know ThousandEyes – Part 1

WAN observability with agents running in the cloud “Do not try this at home!” It’s the all too familiar warning you may have heard way too many times while growing up. Perhaps when watching an Evil Knievel stunt. Or, seeing the antics of Johnny Knoxville and Steve-O on MTV’s Jackass series. (Seriously, do not try any of that at home.) Instead, try observing the performance of the network between your home Internet connection and another…

Read More

NATO releases its first strategy for Artificial Intelligence

NATO releases its first strategy for Artificial Intelligence

This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of AI in a responsible manner. Artificial Intelligence (AI) is changing the global defence and security environment, for this reason, NATO Defence Ministers released the first-ever strategy for this technology that promotes its development and use in a responsible manner. Below are NATO principles of responsible use of Artificial Intelligence in defence: Lawfulness: AI applications will be developed and…

Read More

The APJC Innovation Challenge: Merging Technology and Outcomes that Benefit the Community – Cisco Blogs

The APJC Innovation Challenge: Merging Technology and Outcomes that Benefit the Community – Cisco Blogs

As we head towards Cisco Partner Summit in a few weeks, (I hope you have registered already) it is a great time to look at how the Cisco Partner ecosystem is using not only technology but also innovation, agility and customer centric thinking to ensure that businesses of all sizes across the region are finding new ways to meet the evolving customers needs.    It is this mindset that makes our Partner Innovation Challenge so special….

Read More

Cybersecurity Month: Work from Home Security Awareness Training

Cybersecurity Month: Work from Home Security Awareness Training

As an  Official Champion of National Cyber Security Awareness Month (NCSAM), the Council will be sharing educational resources on payment security best practices on the PCI Perspectives blog, and through our Twitter (@PCISSC) and LinkedIn pages. The Council will align these resources with the four weekly themes outlined by the National Cyber Security Alliance:

Read More

Docker Captain Take 5 – Aurélie Vache – Docker Blog

Docker Captain Take 5 – Aurélie Vache – Docker Blog

Docker Captains are select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others. “Docker Captains Take 5” is a regular blog series where we get a closer look at our Captains and ask them the same broad set of questions ranging from what their best Docker tip is to whether they prefer cats or dogs (personally, we like whales and turtles over here)….

Read More

DiploFoundation Develops Simulated Cyber-Attack Game

DiploFoundation Develops Simulated Cyber-Attack Game

A non-profit educational foundation has teamed up with a cybersecurity company to develop a game that reveals what happens in a cyber-attack. The online simulation is the joint effort of Kaspersky and the DiploFoundation, and is based on the Kaspersky Interactive Protection Simulation (KIPS). The game was created with the intention of helping diplomats and professionals who lack a technical background to understand how digital assaults unfold so that they are better equipped to formulate an effective response…

Read More

Five Key Questions for a Zero Trust Security Deployment – Cisco Blogs

Five Key Questions for a Zero Trust Security Deployment – Cisco Blogs

You may be considering applying zero trust principles across your organization, but are unclear on where to start or how changes will impact the user experience. We had these considerations in mind as Cisco IT moved from a traditional model of perimeter and VPN security to a model based on zero trust. Our goal was to improve security and create a better access experience for our 100,000+ users. We explored many questions in our journey…

Read More

Nominations Sought for Global Cyber Awards

Nominations Sought for Global Cyber Awards

The organizers of the Globee Business Awards are seeking nominations for the top performers in the cybersecurity industry.  Star performers are being sought for the 18th Annual 2022 Cybersecurity Global Excellence Awards, which recognize achievements on an industry-wide scale and between peers. Entries will be accepted from all organizations (private or public), corporations, non-profits, associations, and vendors around the world.  The categories for this year’s Cybersecurity Global Excellence Awards have been reimagined to reflect the new challenges and innovations…

Read More

Companies that pay ransomware attackers get thumbs down from consumers

Companies that pay ransomware attackers get thumbs down from consumers

More than half of those surveyed by data management firm Cohesity said that companies that pay the ransom in an attack encourage ransomware and bad actors. Image: Shutterstock/Vchal One of the biggest questions faced by an organization hit by ransomware is whether to pay the ransom. Many do pay simply because they feel it’s the quickest and easiest way of getting back to business. But that strategy is not one favored by many consumers, some…

Read More

Cisco Silicon One’s Lead Continues Growing – Cisco Blogs

Cisco Silicon One’s Lead Continues Growing – Cisco Blogs

Back in December of 2019, we made a bold announcement about how we’ll forever change the economics of the internet and drive innovation at a speed like no one had ever seen before. Since then, we’ve been very busy. In October of 2020, we announced six new devices, and in March of 2021, we announced the addition of three new devices, including our first 25.6 Tbps web scale switching device. Today, less than seven months…

Read More
1 3,406 3,407 3,408 3,409 3,410 3,968