Inspiring generations: One woman’s unexpected journey as a Cisco Networking Academy instructor – Cisco Blogs

Inspiring generations: One woman’s unexpected journey as a Cisco Networking Academy instructor – Cisco Blogs

Lutfiyyah Patel, Cisco Networking Academy instructor at Siyafunda Community Technology Centre in South Africa Six years ago, if you would’ve told Lutfiyyah Patel (or Lulu, as her students call her) she was going to be a Cisco Networking Academy instructor who inspires students throughout South Africa – she wouldn’t have believed you. Growing up, Lulu wanted to be a chef; but culinary school was too expensive, even with government aid. So she supported the family…

Read More

Winner Crowned in “Hacker Games” Contest Promoting Secure Coding Skills

Winner Crowned in “Hacker Games” Contest Promoting Secure Coding Skills

The University of Warwick has been crowned as the winner of Veracode’s inaugural Hacker Games competition. After coming out on top in a collegiate contest between eight universities from across the UK and US, the WMG Cyber Security Center at the University of Warwick was awarded a $10,000 charitable donation. Tufts University came in second place, earning a $5000 donation. Additionally, prize money was given to each individual player from the winning teams and overall top scorers….

Read More

Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges

Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges

Adopting a hybrid approach can help organizations run, unify and secure all digital identities in an IT architecture, new research finds. Image: iStock/BeeBright Over 80% of global IT decision-makers have already adopted, or plan to adopt or expand cloud-based identity and access management initiatives over the next two years, a new study finds.  The study, “Identity and Access Management (IAM) for the Hybrid Enterprise,” conducted by Forrester Consulting for ForgeRock and Google Cloud, also found…

Read More

Shadow IT is your organization’s next remote-working nightmare

Shadow IT is your organization’s next remote-working nightmare

Employees are increasingly using their own devices and accounts to work from home – largely because it’s easier to do so. Yet this rise in ‘shadow IT’ puts corporate security at risk. Remote working remains a nightmare for IT teams. Image: iStock/cyano66 Remote working has introduced a cluster of headaches for organizational IT teams, with security being perhaps the biggest. With employers having lost oversight on IT practices and under-equipped workers having to make do…

Read More

Microsoft Office 365 still the top target among phishing attacks

Microsoft Office 365 still the top target among phishing attacks

Most of the recent credential phishing attacks seen by Menlo Security served phony Outlook and Office 365 login pages. Image: iStockphoto/weerapatkiatdumrong Phishing attacks rely on exploiting popular brands, products and services in an attempt to trick anyone who uses those items. The more popular the subject, the better the odds of snagging enough people to make the campaign worth the effort. In a report published Wednesday, cloud security provider Menlo Security looks at the latest…

Read More

Don’t give hackers a home run by using these baseball team names in your passwords

Don’t give hackers a home run by using these baseball team names in your passwords

Cincinnati Reds fans: It’s especially time for you to rethink your team as a common part of your credentials. Artur Didyk, Getty Images/iStockphoto The start of Major League Baseball season is upon us, and password security firm Specops software is using the yearly milestone to remind people that easily guessed passwords like those containing MLB team or mascot names are a sure-fire way to strike out on keeping your account safe.  “Hackers are known to…

Read More

Educate Your Whole Team with Corporate Group Training Classes

Educate Your Whole Team with Corporate Group Training Classes

Through Corporate Group Training, the PCI Security Standards Council (PCI SSC) offers a great way to train your entire team at once on any of PCI SSC’s 15 existing standards and programs. In this blog, we interviewed PCI SSC Director, Training Programs Travis Powell, about how the Corporate Group Training format can enhance your organization’s professional development.

Read More

Tax refund phishing scam targets university students and staffers

Tax refund phishing scam targets university students and staffers

The IRS is warning of a phishing scam that promises refund information but looks to capture Social Security numbers and other sensitive data. Image: designer491, Getty Images/iStockphoto With tax season in bloom, cybercriminals have launched a series of phishing attacks aimed at university students and employees eager to receive potential tax refunds. SEE: Identity theft protection policy (TechRepublic Premium) On Tuesday, the IRS issued a warning about a new and ongoing campaign targeted at students and staffers…

Read More

Introducing the Catalyst 8200L: SASE Deployments for Small Branch – Cisco Blogs

Introducing the Catalyst 8200L: SASE Deployments for Small Branch – Cisco Blogs

People want simplicity in technology. They want secure connectivity no matter where employees work or where the application sits. The secure access service edge (SASE) combines cloud security and SD-WAN for this purpose. Yet, any network engineer will tell you that performance should never be sacrificed for simplicity. Someone trying to send an important email would say the same. It’s for these reasons that Cisco is proud to introduce the Catalyst 8200L, a powerful edge…

Read More

Building the Bridge to Your Next Digital Evolution – Cisco Blogs

Building the Bridge to Your Next Digital Evolution – Cisco Blogs

For many service providers leaning into 5G, preparing for their next digital evolution can be perplexing, costly, and time consuming. Not only are service providers required to build the bridge as they walk on it, but they also need to keep their eyes on the customer experience, recruit and train talent, grow the business, and innovate new services. To successfully support our customers on their digital transformation journey, last year, Cisco Business Critical Services unveiled…

Read More
1 3,460 3,461 3,462 3,463 3,464 3,545