Palo Alto Networks Positioned as a Leader in Inaugural Zero Trust Network Access Report by Leading Independent Research Firm

Palo Alto Networks Positioned as a Leader in Inaugural Zero Trust Network Access Report by Leading Independent Research Firm

Analyst report states “[Palo Alto Networks] is a good fit for organizations seeking a hybrid of SaaS and on-premises software.” SANTA CLARA, Calif., Aug. 24, 2021  /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today it has been positioned as a leader in The Forrester New Wave™: Zero Trust Network Access (ZTNA), Q3 2021 report. Palo Alto Networks was among the 15 select vendors that Forrester evaluated for the report. Forrester…

Read More

Back-to-Basics: Properly Configured Firewalls

Back-to-Basics: Properly Configured Firewalls

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

Securing critical infrastructure: 3 actions to take ASAP – Cisco Blogs

Securing critical infrastructure: 3 actions to take ASAP – Cisco Blogs

The Colonial Pipeline attack is the latest reminder that critical infrastructure needs stronger protection. The problem isn’t the lack of available cybersecurity solutions. It’s the opposite. With so many solutions available, deciding which ones will provide the most value can be overwhelming. It’s a similar feeling to how we felt as children in a toy store, while clutching our pocket money. For basic protections, here are three actions that every critical infrastructure provider should take…

Read More

Risk officers and board members don’t agree on use of tech and data in business

Risk officers and board members don’t agree on use of tech and data in business

Survey by EY finds that board members are interested in spending more money on technology and data analytics for risk management. TechRepublic’s Karen Roby spoke with Tonny Dekker, global enterprise risk consulting leader at EY, about how boards feel about investing in technology for risk management. The following is an edited transcript of their conversation. SEE: Security incident response policy (TechRepublic Premium) Karen Roby: EY released the findings of a new survey, in which it…

Read More

Year-End Reflections: Learnings with Women of Cisco – Cisco Blogs

Year-End Reflections: Learnings with Women of Cisco – Cisco Blogs

The end of the year and the start of the next is always a time of retrospection and celebration. Last week was Cisco’s fiscal year earnings announcement, so now seems like a great time to reflect on some of my learnings from my tenure as co-lead of Women of Cisco Americas board. Inclusivity goes beyond standard descriptors. Inclusivity is not only about gender, race or ethnicity. It encompasses representation from different geographies, organizations, and career…

Read More

Microsoft Power Apps misconfiguration exposes data from 38 million records

Microsoft Power Apps misconfiguration exposes data from 38 million records

The leaked data included personal information for COVID-19 contact tracing and vaccination appointments, social security numbers for job applicants, employee IDs, names and email addresses. Image: Microsoft A lack of proper security configuration with Microsoft’s Power Apps has led to the exposure of data from some 38 million records, according to security firm UpGuard. In a report published Monday, UpGuard said that the misconfiguration of the low-code development platform exposed such information as COVID-19 contact…

Read More

Application Aware Networking with Cisco SD-WAN – Cisco Blogs

Application Aware Networking with Cisco SD-WAN – Cisco Blogs

Part 2: Optimizing Application Experience As applications are migrating to the cloud and being offered either as Software-as-a-Service (SaaS) or built as cloud native infrastructure, the network must become more application aware, programmable, and intelligent to deliver the best experience to users. My previous blog post discussed how Cisco Software-Defined WAN (SD-WAN) provides seamless connectivity to applications from anywhere. This blog post explores how applications can take advantage of and work cooperatively with the network to…

Read More

McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion Pump

McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion Pump

Overview As part of our continued goal to provide safer products for enterprises and consumers, we at McAfee Advanced Threat Research (ATR) recently investigated the B. Braun Infusomat Space Large Volume Pump along with the B. Braun SpaceStation, which are designed for use in both adult and pediatric medical facilities. This research was done with support from Culinda – a trusted leader in the medical cyber-security space. Though this partnership, our research led us to…

Read More

Takachar: Meet the team that developed a solution to make economic use of biomass residues while reducing air pollution – Cisco Blogs

Takachar: Meet the team that developed a solution to make economic use of biomass residues while reducing air pollution – Cisco Blogs

Now that the Cisco Global Problem Solver Challenge 2021 winners have been officially announced, we are excited for you to learn more about each winning team and the story behind each innovation. The Cisco Global Problem Solver Challenge is an annual competition that awards cash prizes to early-stage tech entrepreneurs solving the world’s toughest problems. Now in its fifth year, the competition awarded its largest prize pool ever, $1 million USD, to 20 winning teams from around the world.   Globally,…

Read More
1 3,518 3,519 3,520 3,521 3,522 3,933