Back-to-Basics: Secure Remote Access

Back-to-Basics: Secure Remote Access

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

SASE: SD-WAN First or Security First?

SASE: SD-WAN First or Security First?

In our SASE video series, we’ve explored WAN and security architecture transformation with SASE. We’ve described how the right SASE architecture enables enterprises to ensure direct and secure access to cloud-hosted applications and services for users, regardless of location or the devices used to access them. We’ve talked about how IoT requires security considerations that SASE doesn’t completely address. And we’ve articulated that the overall business driver to transform WAN and security architectures to SASE is to deliver…

Read More

Automate your Cisco Secure Firewall deployment – Cisco Blogs

Automate your Cisco Secure Firewall deployment – Cisco Blogs

Infrastructure as a Code (IaC) and Automation are now common requests from our customers deploying Cisco Secure Firewalls. This is accelerated with a rapid development of software applications in multi-cloud environments. Our response to this trend is making Cisco Secure Firewall deployable as a code utilizing new IaC templates, which we are happy to announce! To implement IaC, customers require highly skilled engineers generating time-consuming & costly automation scripts. More compelling alternative is to utilize prebuild…

Read More

Top 5 tech annoyances

Top 5 tech annoyances

Tom Merritt tells us his top five annoyances in tech and why they are frustrating. Technology is our job, it’s our recreation, I daresay for many of us, it’s our life.And it can be ANNOYING. Those annoyances have changed over the years. In 1996, I know some had to do with Trumpet Winsock. What are they these days? I did an informal poll of my friends in tech to find out what they find most…

Read More

Simply Faster than the Rest, Cisco Wi-Fi 6 + Multigigabit Switching

Simply Faster than the Rest, Cisco Wi-Fi 6 + Multigigabit Switching

It’s a typical day, and as you’re mindlessly scrolling through your phone again, *ding*, a notification reads, “Flying cars will be available for purchase in just one year!”. Wow, that’s exciting! But would you be surprised? The fact is, technology is advancing so fast that before we can adjust to the current innovation, a better version is already available. Just look at where we were with virtual reality, self-driving cars, and IoT smart homes only…

Read More

Tenable Named a Winner in CRN’s 2021 Annual Report Card Awards

Tenable Named a Winner in CRN’s 2021 Annual Report Card Awards

Tenable®, Inc., the Cyber Exposure company, today announced that CRN ®, a brand of The Channel Company, has named it a winner in the Security Management category of the 2021 CRN Annual Report Card (ARC) Awards. Tenable has also won all Security Management subcategories, including product innovation, support, partnership and managed and cloud services. The awards highlight the partner trust and industry leadership Tenable has built through its Tenable Assure Partner Program. “As a channel-first…

Read More

Four Security Best Practices for Today’s High-Risk Digital World – Cisco Blogs

Four Security Best Practices for Today’s High-Risk Digital World – Cisco Blogs

While digital acceleration has been building for some time, recent digital disruptions have shifted its pace into overdrive, leaving a ripple effect of security complications in its wake. Increases in online shopping, virtual communities, and the exponential growth in remote workforces have created more vulnerabilities than ever. Once rigid, IT’s now more porous walls have created a veritable playground for malicious actors, exposing businesses and their customer data to greater risk, potential data breaches, and…

Read More

Making an Impact – Empowering Girls in Mozambique  – Cisco Blogs

Making an Impact – Empowering Girls in Mozambique  – Cisco Blogs

During the rollercoaster of emotions 2020 brought, I decided to take action and become more involved with Cisco’s Inclusive Communities. It was something I had been telling myself that I would do for years. Now, I would make that happen. I started by joining our Women of Cisco Inclusive Community here in Portugal, and later in 2020 I was asked to co-lead our local chapter. What an honor! Not only was this a great way…

Read More

Are you ready for the 3G sunset?

Are you ready for the 3G sunset?

All good things must come to an end, and that includes the 3G network that has been around since the late aughts. Telcos are supporting and building out vastly superior 5G networks, and they don’t want to spend time and money maintaining older technologies that aren’t used much. Removing older 3G towers makes space for 5G equipment and simplifies network management. Plus, some 3G spectrum can be used for 4G data, although 3G can’t be…

Read More
1 3,616 3,617 3,618 3,619 3,620 4,014