SCADAfence Partners with Keysight Technologies

SCADAfence Partners with Keysight Technologies

A new partnership aimed at amplifying the security of operational technology (OT) networks was announced today by cybersecurity company SCADAfence. Under the new pact, SCADAfence will join forces with American manufacturer of electronics testing and measurement equipment and software, Keysight Technologies, to enhance the cybersecurity of complex OT networks and boost their network visibility. Through continuous monitoring and proactive mitigation, the new partnership aims to increase the control that organizations have over their industrial environments. The union brings together SCADAfence’s…

Read More

14 things you need to know about data storage management

14 things you need to know about data storage management

“When it comes to storing data, there is no ‘one-size-fits-all’ solution,” says Orlando Scott-Cowley, Messaging, Security and Storage Evangelist at Mimecast, a cloud and mobile data storage and security provider. Before you decide where or how you will store your structured and unstructured data, “companies first need to understand the amount and type of data they have along with the motivation behind storing the information,” Cowley says. “Having this background will help determine what route…

Read More

US Execs Tout Retaliation Over Diplomacy

US Execs Tout Retaliation Over Diplomacy

Business executives in the United States favor retaliatory action over diplomacy when it comes to preventing cyber-attacks.  A day after American president Joe Biden announced his intention to replace “relentless war” with “relentless diplomacy,” new research by Arctic Wolf shows that just 15% of US executives believe that diplomacy effectively stops future cyber-attacks.  More than twice as many US executives – 31% – believe that retaliatory cyber-attacks against foreign nations would be effective in putting a halt to digital assaults.   When…

Read More

Ransomware now accounts for 69% of all attacks that use malware

Ransomware now accounts for 69% of all attacks that use malware

The most common targets of ransomware in the second quarter of 2021 were governmental, medical and industrial companies along with scientific and educational institutions, says Positive Technologies. Image: Getty Images/iStockphoto Ransomware attacks have hit “stratospheric” levels, according to a report released Wednesday by cybersecurity firm Positive Technologies. In the second quarter of 2021, ransomware accounted for 69% of all attacks involving malware, a 30% jump from the same quarter in 2020. The most popular targets…

Read More

#IMOS21: Shoot for the Stars to Succeed in Infosecurity — Alyssa Miller

#IMOS21: Shoot for the Stars to Succeed in Infosecurity — Alyssa Miller

Cybersecurity professionals need to shoot for the stars and overcome self-confidence issues to progress in their careers. That was the message of an illuminating keynote address by Alyssa Miller, business information security officer, SMP Global, while giving the keynote address at the Infosecurity Magazine Autumn Online Summit – North America 2021. Miller began by describing her own career to date, and how she reached the heights of business information security officer at SMP Global, where…

Read More

VMware Named a Leader in the 2021 Gartner® Magic Quadrant™ for WAN Edge Infrastructure for Fourth Consecutive Year

VMware Named a Leader in the 2021 Gartner® Magic Quadrant™ for WAN Edge Infrastructure for Fourth Consecutive Year

News Detail Company Also Scores Highest in the Cloud-First WAN Use Case in the 2021 Gartner® Critical Capabilities for WAN Edge Infrastructure Report PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today announced it has been positioned by Gartner, Inc. as a Leader in the 2021 Magic Quadrant for WAN Edge Infrastructure. According to Gartner, VMware was evaluated on its ability to execute and … Wed, 22 Sep 2021 00:00:00 Company Also Scores Highest in…

Read More

Automating AWS with Cisco SecureX

Automating AWS with Cisco SecureX

The power of programmability, automation, and orchestration Automating security operations within the public clouds takes advantage of the plethora of today’s capabilities available and can drive improvements throughout all facets of an organization. Public clouds are built on the power of programmability, automation, and orchestration. Pulling all of these together into a unified mechanism can help deliver robust, elastic, and on-demand services. Services that support the largest of enterprises, or the smallest of organizations or…

Read More

CVE-2021-22005: Critical File Upload Vulnerability in VMware vCenter Server

CVE-2021-22005: Critical File Upload Vulnerability in VMware vCenter Server

VMware published an advisory addressing 19 vulnerabilities, including one critical flaw in vCenter Server that is reportedly simple to exploit. Background On September 21, VMware published a security advisory addressing 19 vulnerabilities in vCenter Server, its centralized management software for VMware vSphere systems. The full list of vulnerabilities patched includes: CVE Description CVSSv3 CVE-2021-22005 vCenter Server file upload vulnerability 9.8 …

Read More

The power of possibilities – Cisco UCS X210c M6 Compute Node – Cisco Blogs

The power of possibilities – Cisco UCS X210c M6 Compute Node – Cisco Blogs

Cisco UCS X-Series was designed to be modular, expandable, and blur the lines between the efficiencies of blade servers (cable reduction and power & cooling) and the expandability of rack servers (storage & PCIe). It all starts with the Cisco UCS X210c Compute Node.   The Brains   The Cisco UCS X210c M6 Compute Node is based on 3rd Gen Intel® Xeon® Scalable processors. With 8 to 40 powerful cores and a wide range of…

Read More
1 3,491 3,492 3,493 3,494 3,495 3,972