Innovation in Ultra-Low Latency Network Solutions – Cisco Blogs

Innovation in Ultra-Low Latency Network Solutions – Cisco Blogs

Cisco expands and strengthens the Nexus ULL Network Solutions portfolio with two new products.   Innovative Cisco Nexus 3550-T Programmable Switch Platform The Cisco Nexus® 3550-T is a new innovative application platform built on software-defined hardware designed to run FPGA network applications. The Nexus 3550-T initially operates as a very fast top-of-rack configurable 48-port low-latency Layer 3 switch built around a flexible programmable FPGA device. The Nexus 3550-T has the performance characteristics of hardware combined…

Read More

Knowing where the line is in IT risk management

Knowing where the line is in IT risk management

Every organization should have an agreed understanding of risk, what that means for the company, and where the line of acceptability is (threshold). Knowing where this line is, and using it as a driving force for decision making within IT, can dramatically maximize resources and decrease costs.  Decision making Risk Management sometimes has the unfortunate nickname of being titled the Business Prevention Unit (BPU), but actually, that name couldn’t be further from the truth. Robust…

Read More

Infosecurity Magazine Spring Online Summit Now Available On-Demand

Infosecurity Magazine Spring Online Summit Now Available On-Demand

Last week (March 23 and 24) Infosecurity Magazine hosted its annual Spring Online Summit – a two-day virtual event showcasing 14 live, CPE-accredited sessions moderated by the Infosecurity editorial team, featuring an array of experts and thought-leaders discussing various topics and issues currently impacting the information security industry. Infosecurity is delighted to announce that the full event is now available to watch on-demand via the Infosecurity website. The immersive education program includes keynote presentations from…

Read More

UK’s CNI Security Threatened by Staff Burnout

UK’s CNI Security Threatened by Staff Burnout

The security of the UK’s transport, energy and other critical national infrastructures (CNI) could be threatened by staff burnout and IT skills shortages, according to new research from cybersecurity services company Bridewell Consulting. The firm discovered that, in the last year, 85% of IT decision-makers working to protect Britain’s infrastructure have felt increased pressure to improve cybersecurity controls. Of those, 47% have suffered unsustainable stress, 41% have been absent because of burnout, 32% are looking…

Read More

NaaS: Network-as-a-service is the future, but it’s got challenges

NaaS: Network-as-a-service is the future, but it’s got challenges

As-a-service offerings have been around for more than 10 years with roots that are decades older than that, and now this ever-expanding category of service offerings includes enterprise network-as-a-service. NaaS enables enterprises to outsource network functionality at network Layers 4-7—such as software-defined WAN (SD-WAN) and application delivery controller (ADC)—as well as Layers 1-3, which includes switches and routers. Full adoption of NaaS is still in its early days because most enterprise network functions require physical…

Read More

German MPs Hit by Russian-Backed Phishing Attacks

German MPs Hit by Russian-Backed Phishing Attacks

German lawmakers have been targeted once again by phishing attacks reportedly linked to Russian intelligence services. Local reports claimed yesterday that seven members of the Bundestag and 31 members of the state parliament had their inboxes compromised, although these appear to have been personal rather than official accounts. The phishing emails were spoofed to appear as if urgent messages sent by providers GMX and T-Online. The politicians belong to governing parties the CDU/CSU and SPD….

Read More

The Best Network Protection: Go Deep or Go Broad?

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their security solutions. Mostly, the choice varies between predominantly one or the other. Going deep typically means careful monitoring and analysis of certain types of threats or behaviors at the cost of not examining a much broader range of activity. Solutions that are broader may lack…

Read More

Peer-To-Peer Cybersecurity Insights For 2021

Peer-To-Peer Cybersecurity Insights For 2021

Based on real practitioners’ experiences By Stuart Berman, IT Central Station Super User December is typically a month when people who work in the IT field offer predictions for the coming year. 2020 has been a highly atypical year, however, so it’s a bit daunting to think about what’s coming over the horizon. Yet, my company is in a unique position to engage in prognostication. We source user data directly from users in the trenches….

Read More

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority in 2021 and beyond

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority in 2021 and beyond

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority for organizations in 2021 and beyond | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the…

Read More

Cybersecurity risk – increased by the pandemic – redefines the workplace

Cybersecurity risk – increased by the pandemic – redefines the workplace

Cybersecurity risk – increased by the pandemic – redefines the workplace | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More
1 3,464 3,465 3,466 3,467 3,468 3,539