Overmedicated: Breaking the Security Barrier of a Globally Deployed Infusion Pump

Overmedicated: Breaking the Security Barrier of a Globally Deployed Infusion Pump

Cyberattacks on medical centers are one of the most despicable forms of cyber threat there is. For instance, on October 28th, 2020, a cyberattack at the University of Vermont Medical Center in Burlington VT led to 75% of the scheduled chemotherapy patients being turned away. Many of us have friends and loved ones who have had to undergo intensive treatments, and the last thing we want in this situation is for their critical care to…

Read More

Arista Extends Cloud-Grade Routing to the Network Edge

Arista Extends Cloud-Grade Routing to the Network Edge

Novel next generation routing endorsed by service provider customers SANTA CLARA, Calif.–(BUSINESS WIRE)– Arista Networks (NYSE:ANET), a leader in cognitive cloud networking, announced today the expansion of its cloud-grade routing solutions for next generation network edge roles in the multi cloud era. Arista’s EOS® (Extensible Operating System) enhancements for cloud and service provider customers transform edge and backbone routing, migrating from legacy routers to software-driven, highly available and scale-out architectures for faster time to revenue…

Read More

Top strategies for Future Cloud in Government

Top strategies for Future Cloud in Government

Cloud technologies have definitely proven their value to the public sector over the last 18 months. Agile and powerful, the cloud offers governments the ability to innovate at scale while leveraging existing infrastructure to affordably modernize government IT. But things are just heating up for the future of cloud. As current cloud strategies become proven, they’ll need to evolve into something new – a “Future Cloud” approach. In a recent Q&A with Government Technology, I…

Read More

Thriving at Cisco – Cisco Blogs

Thriving at Cisco – Cisco Blogs

At 15, I was diagnosed with depression. I always felt it should be something I hide away and never bring up at a job interview or on an application form. I always thought it is something to be ashamed of – that my gaps in employment should have solid explanations – and that my reasons for dropping out of my first year at University (“I didn’t like the course” or “I wanted to travel”) were…

Read More

Choosing and changing your Linux shell

Choosing and changing your Linux shell

There are quite a few shells on Linux system and more that can be easily added. This post examines some of the more popular shells, how they differ and the files that contribute to their configuration. The default shell on most Linux systems is bash. Unless you make an effort, any user accounts added to the system will be assigned bash as their login shell. Bash has been around since 1989 and was meant to…

Read More

How to choose the best NVMe storage array

How to choose the best NVMe storage array

Storage will never be as fast as system memory–that’s just the nature of system architecture. But thanks to NVMe (nonvolatile memory express), SSDs can deliver such blazingly fast performance, the penalty of “going to disk” tends to be miniscule. NVMe encompasses a family of specifications for how software talks to storage. It works over a number of transport methods, including PCI Express, RDMA, and TCP. Storage arrays that support the NVMe standard are the sports cars…

Read More

Time to Fix High Severity Apps Increases by Ten Days

Time to Fix High Severity Apps Increases by Ten Days

The average time taken to fix high severity application security flaws has increased by ten days in just a month, according to the latest data from NTT Application Security. The security vendor’s AppSec Stats Flash report for August offers a broad view of the current state of application security across various verticals. Most important is the data that details how quickly or otherwise organizations are at closing the window of exposure (WoE) between a patch…

Read More

Over a Third of Smart Device Owners Do Not Take Security Measures

Over a Third of Smart Device Owners Do Not Take Security Measures

More than a third (35%) of connected device owners in the UK do not take additional security measures to protect their smart home devices and rely solely on inbuilt security features. This is according to findings from the 2021 Norton Cyber Safety Insights Report: Special Release – Home & Safety, which examined consumers’ at-home online behaviors. The UK portion of the study revealed a worrying lack of security hygiene for smart devices among British consumers. Only…

Read More

Microsoft Power Apps Tool Exposed 38 Million Records by Default

Microsoft Power Apps Tool Exposed 38 Million Records by Default

A configuration issue with a popular Microsoft development platform has exposed tens of millions of sensitive customer records, including those containing COVID-19 information, according to researchers. Microsoft Power Apps enables “citizen developers” to create mobile and web-based apps for their businesses. However, a team from UpGuard found that the portal for the platform was configured to allow public access in many cases, exposing at least 38 million records. The issue stems from the Open Data…

Read More

Securing Enterprise Mailboxes with Hornetsecurity

Securing Enterprise Mailboxes with Hornetsecurity

Introduction In 2020 Microsoft reported over 258 million monthly commercial users of its Office 365 productivity suite. For decades Microsoft has been powering business with software like Outlook, Word, and Excel. As technology and connectivity have improved, so has functionality and user requirements. Now, over 75 million people use Microsoft Teams every month for virtual meeting experiences. Consumers of Microsoft technology have moved away from self-managed instances of services like Microsoft Exchange for email communication,…

Read More
1 3,519 3,520 3,521 3,522 3,523 3,933