Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training

Personalization and behavior modeling: a new approach to security training | 2021-04-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Product Takeback and Reuse – One Year Later – Cisco Blogs

Product Takeback and Reuse – One Year Later – Cisco Blogs

Reflecting on the nexus of Cisco’s product takeback and reuse program a year and a half after we relaunched it, Cisco VP of Global Distribution Sales Andrew Sage explains, “We wanted to make it as easy for our customers and partners to [send back old equipment] as it is to take recycling to the end of the driveway.” By streamlining and simplifying the customer experience, Cisco has made important progress toward that goal. Let’s take…

Read More

Transform IT for Agility, Innovation, and Growth – Cisco Blogs

Transform IT for Agility, Innovation, and Growth – Cisco Blogs

From the dot-com bust to the global financial crisis, past disruptions have led many businesses to put their digital strategies on the backburner. Organizations that continued to invest in next-generation technologies had an easier time shifting gears to speed ahead. They understood that proactive optimization and continuous transformation are necessary pathways to agility, growth, and innovation. It’s time to transform Fast-forward to 2021. Digital technology is now commonplace in nearly every industry, but organizations are…

Read More

The boom in collaboration software creates extra security risks

The boom in collaboration software creates extra security risks

While the software solutions have made it easier to work from home, they’ve also made it easier to launch malware. TechRepublic’s Karen Roby spoke with Otavio Freire, president, CTO and co-founder of SafeGuard Cyber, about security issues in collaboration software. The following is an edited transcript of their conversation. Karen Roby: We do all of our work now, or the good majority of it, through things like this, right? Zoom and Teams, and we’re talking…

Read More

Addressing the Challenge of Application Performance and the Cloud – Cisco Blogs

Addressing the Challenge of Application Performance and the Cloud – Cisco Blogs

Not to state the overly obvious, but companies have substantially accelerated their migration to the cloud over the last eighteen months. The pandemic forced them to get more done, faster, and often for less. And they found the cloud was the ultimate enabler. The move to the cloud, even with all of its promise, isn’t without challenges. Cloud-based applications may seem easy for individual users to access—just click and go. But, for IT departments, it’s…

Read More

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

China-linked APT used Pulse Secure VPN zero-day to hack US defense contractors

At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the networks of US defense contractors. According to coordinated reports published by FireEye and Pulse Secure, two hacking groups have exploited a new zero-day vulnerability in Pulse Secure VPN equipment to break into the networks of US defense contractors and government organizations worldwide. The statement reveals that one of the two hacking groups was a China-linked cyber espionage group….

Read More

Parrot OS Security edition is a Linux desktop distribution geared for security admins

Parrot OS Security edition is a Linux desktop distribution geared for security admins

Security professionals would be well-served with this Linux distribution that offers a wide range of penetration and vulnerability testing tools. Image: gorodenkoff/Getty Images/iStockphoto Sometimes, choosing a Linux distribution is a challenge. Given how many options are available, anyone faced with the selection could find their head spinning in a dizzying display of confusion. For certain types of users, the selection gets a bit more focused. A particular type of user is one who either places…

Read More

Simplify Endpoint Security with new ISE GUI – Part 2

Simplify Endpoint Security with new ISE GUI – Part 2

Welcome to part 2 of the journey to Vanilla ISE, a simplified ISE GUI for endpoint technicians. In part 1 we covered the background and requirements for the UI. In this part 2, we will explore the relevant documentation to find the relevant API calls we will use. Documentation Exploration Once I had an idea for the functionality I needed to incorporate with the program, I started breaking it down to individual functions and individual…

Read More

Learn How NetBox Can Be Inventory Source of Truth for Cisco NSO

Learn How NetBox Can Be Inventory Source of Truth for Cisco NSO

Many challenges NetDevOps teams run up against relate to staying true to the Source of Truth approach to automation.  To truly matter, a Source of Truth must be used everywhere, not just where and when convenient.  I recently tackled on of these challenges within our network automation projects over in Learning at Cisco. For more details on Source of Truth checkout The challenge was how to keep the device inventory in our Cisco NSO servers accurate…

Read More
1 3,415 3,416 3,417 3,418 3,419 3,554