Paving the Way: Inspiring Women in Payments – A Podcast Featuring Agnes Ng

Paving the Way: Inspiring Women in Payments – A Podcast Featuring Agnes Ng

  Sometimes, being a woman brings in a more human touch when navigating through challenging security issues. This sensitivity to customer concerns is exactly what has helped Agnes Ng achieve success as a female entrepreneur in the Singapore payment industry. In this edition of our podcast, Agnes explains that despite a lack of women taking technology courses as part of their education in Singapore, she believes that more doors will be opened to women in…

Read More

OWASP updates top 10 list with decades old security risk in #1 spot

OWASP updates top 10 list with decades old security risk in #1 spot

2021 list shows how far application security has come and how much work is left to do. OWASP updated its list of the top 10 software security risks for 2021. This chart illustrates the changes from the 2017 version of the list.  Image: OWASP Security expert and Veracode CTO Chris Wysopal identified broken access control as a security risk in 1996. OWASP just pushed that software security problem to the first spot in the 2021…

Read More

Why Can’t We Automate Everything?

Why Can’t We Automate Everything?

You can’t automate every business process. While I love automation and promote the concept, I know its limitations. This viewpoint needs to be recognized and observed as more security officials implement automation within their organizations. I’d estimate that for most enterprises, the first 80 percent of migrating and integrating processes to automation is easy to do. The last 20 percent is hard to accomplish. This breakdown helps you set realistic expectations about automation. I enjoy…

Read More

MSP: What They Are and Why Organizations Go with Them

MSP: What They Are and Why Organizations Go with Them

The skills gap continues to challenge organizations’ ability to fulfill their evolving cybersecurity requirements. Tripwire confirmed this back in 2020 when it partnered with Dimensional Research to survey 342 security professionals. Indeed, 83% of respondents told Tripwire that they felt more overworked going into 2020 than they did a year earlier. Approximately the same percentage said that their teams were understaffed and that it had become more difficult over the years to hire skilled security…

Read More

How Cisco Talent Bridge helps to build a more inclusive future – Cisco Blogs

How Cisco Talent Bridge helps to build a more inclusive future – Cisco Blogs

Occasionally that small idea to help a certain few, gains enough momentum where it can help many more than its original scope of impact. Though Cisco Talent Bridge was created as an employment program for Cisco Networking Academy back in 2017, in the past year, it has evolved so that the offerings are more easily available to audiences outside of our previous core focus.   The biggest change was shifting of our flagship resource, the Talent Bridge Matching Engine (TBME) – a job matching tool, under a different organization at Cisco. The shift allowed a new synergy to…

Read More

AIOps Offers Security Teams an Early Warning System

AIOps Offers Security Teams an Early Warning System

By Ranjan Goel, Vice President, Product Management, LogicMonitor IT teams are under immense pressure to work faster than ever and deliver better results—at less cost. And they’re struggling to do it all as their organizations take in rapidly soaring volumes of data that must be captured, analyzed and deployed to improve business outcomes. To meet the challenge, many IT teams are turning to Artificial Intelligence for IT Operations, or AIOps, which uses big data and…

Read More

United Health Centers reportedly compromised by ransomware attack

United Health Centers reportedly compromised by ransomware attack

A ransomware gang called Vice Society claims it grabbed confidential data such as patient benefits, financial documents and lab results. Image: Getty Images/iStockphoto Another health care provider has apparently been the victim of a ransomware attack that exposed private patient information and other sensitive data. A ransomware group known as Vice Society has claimed responsibility for an August attack against United Health Centers that allegedly impacted all of its locations. The incident reportedly led to…

Read More

How Cisco Boosted My Confidence – Cisco Blogs

How Cisco Boosted My Confidence – Cisco Blogs

As I graduated from university and entered the private sector, I was a math student with very low self-confidence. I thought my career likely wouldn’t be for too long, as once I started a family there wouldn’t be roles that would enable me to be both a professional and a mother. I started at Cisco as a contractor after having my first baby, and I realized how exciting it was to have a role that…

Read More

Simply Explained: Ransomware, Phishing, Zero Trust – Cisco Blogs

Simply Explained: Ransomware, Phishing, Zero Trust – Cisco Blogs

Cybersecurity affects all of us, but the industry uses complicated terms that make it hard to understand. For example, what is ransomware and how does it work? What does phishing mean? Or zero trust? Let’s discuss these cyber concepts in simple, everyday language. And let’s cover what the good guys are doing to make our online lives safer. What’s ransomware? Imagine if you started your laptop one day and nothing worked. It turned on, sure,…

Read More

Control Across Your Hybrid Environments Using Cisco Secure Workload 3.6 – Cisco Blogs

Control Across Your Hybrid Environments Using Cisco Secure Workload 3.6 – Cisco Blogs

Business needs are driving significant changes in today’s datacenters. Enterprises are not only migrating applications to the cloud from on-premises data centers, but they are developing multicloud strategies that take advantage of availability, global footprint, and cost saving structures. In fact, IDC has predicted that more than 90% of IT organizations will commit to multicloud architectures by 2022. In addition, datacenters are running applications in a mix of heterogenous private, public and hybrid cloud computing…

Read More
1 3,482 3,483 3,484 3,485 3,486 3,974