Journey to a software-defined access fabric network, part 2 – Cisco Blogs

Journey to a software-defined access fabric network, part 2 – Cisco Blogs

In the first installment of this two-part blog series, I described Cisco IT’s motivations for shifting to a software-defined access fabric network – part of our ongoing journey to an advanced network architecture. In this blog, I will explain our guiding principles for implementing Cisco Software-Defined Access (SD-Access), along with lessons learned and outcomes achieved thus far. In Cisco IT’s Customer Zero organization, we partner with various internal business entities to deploy the company’s latest…

Read More

How penetration testing can promote a false sense of security

How penetration testing can promote a false sense of security

Penetration testing in and of itself is a good way to test cybersecurity, but only if every nook and cranny of the digital environment is tested; if not, there is no need to test. Image: Teera Konakan/Moment/Getty Images Rob Gurzeev, CEO and co-founder of CyCognito, a company specializing in attack-surface management and protection, is concerned about blind spots—past and present. In his DarkReading article Defending the Castle: How World History Can Teach Cybersecurity a Lesson,…

Read More

Scammers Impersonating Windows Defender to Push Malicious Windows Apps | McAfee Blogs

Scammers Impersonating Windows Defender to Push Malicious Windows Apps | McAfee Blogs

Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender Update Victims end up allowing the installation of a malicious Windows Application that targets user and system information Browser push notifications can highly resemble Windows system notifications.  As recently discussed, scammers are abusing push notifications to trick users into taking action.  This recent example demonstrates the social engineering tactics used to trick users into installing…

Read More

POPIA – July 1st Deadline Approaches For New South African Data Protection Act | McAfee Blogs

POPIA – July 1st Deadline Approaches For New South African Data Protection Act | McAfee Blogs

Data protection acts are regularly coming into force around the world and on July 1st 2021 it is the turn of South Africa, as the POPIA (Protection of Personal Information Act) will be enforced from that date.  I caught up with David Luyt, Privacy Counsel at Michalsons in Cape Town to discuss what this means for South African consumers, businesses and IT teams. Nigel: Must my organisation comply with POPIA? David: Essentially, if you are domiciled in…

Read More

Cyber Self-Defense Is Not Complicated

Cyber Self-Defense Is Not Complicated

Anomali Sr. Director of Cyber Intelligence Strategy A.J. Nash recently penned a column for United States Cybersecurity Magazine about how few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance of cyber self-defense. In “Cyber Self-Defense Is Not Complicated,” A.J. talks about why self-commitment is an increasingly effective way to minimize the risks that certainly lurk. Whether it be texts that include personal content not meant for public…

Read More

Cyber Defense Magazine Announces Winners of the Global InfoSec Awards 2021

Cyber Defense Magazine Announces Winners of the Global InfoSec Awards 2021

Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine has spent the past six months scouring the globe and found 3,200 companies who create and offer the most respected information security products and services. CDM has named nearly 15% of these companies as winners of our coveted Global InfoSec Award for 2021 because of their innovations and focus on attempting to stop tomorrow’s breach, today. “In a post-COVID world where SaaS, Cloud Computing…

Read More

Intel: Thoughtful security is essential for innovation

Intel: Thoughtful security is essential for innovation

Intel execs stressed the importance of secure technologies and solid collaborations to improve product resilience and fuel innovation. Image: iStock/sdecoret Computing and communications technologies are woven into the fabric of our daily lives, fueling us to move more quickly into the future, as we adopt and apply the quickly ever-evolving tech. At a press conference on Thursday, May 13, dubbed a “fireside chat,” Intel executives discussed the imminent future and the worldwide key roles of…

Read More

#RSAC: Netflix Exec Explains Where Infosec Pros are Going Wrong

#RSAC: Netflix Exec Explains Where Infosec Pros are Going Wrong

Information security professionals need to be more open to adaptation and embrace emerging ideas to enhance overall cyber-resiliency, according to expert speakers during an opening keynote on day 1 of the virtual RSAC Conference 2021. Jimmy Sanders, information security, Netflix DVD, and Angela Weinman, head of global governance, risk and compliance, VMware, set out three “hard truths” about the sector, and how these negative practices can be addressed.  1. The Security Risk Picture is Out of Focus…

Read More

Proofpoint Introduces NexusAI for Compliance | Proofpoint US

Proofpoint Introduces NexusAI for Compliance | Proofpoint US

Newest solution leverages machine learning to cut false positives by 65 percent while significantly reducing reviewer fatigue and deployment time Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced the launch of NexusAI for Compliance, a new machine learning module for Proofpoint Enterprise Archive customers seeking to enhance supervisory review for regulatory compliance. This scalable artificial intelligence (AI) platform significantly reduces the cost and time spent by organizations on manually reviewing electronic…

Read More

Security Should be a Catalyst, not an Obstacle, to Widespread 5G Adoption

Security Should be a Catalyst, not an Obstacle, to Widespread 5G Adoption

5G is enabling accelerated digital transformation and more innovation for enterprises and mobile network operators (MNOs), with support for massive IoT deployments, ultra-high reliability and low latency wireless networks. However, as with all new technologies, 5G also introduces new security challenges that need to be addressed at the same pace of business requirements. To keep pace, and not introduce bottlenecks, security must operate at the same speed as 5G network ecosystems. Indeed, to realize the…

Read More
1 3,598 3,599 3,600 3,601 3,602 3,794