Mobile devices proved vulnerable during pandemic lockdowns

Mobile devices proved vulnerable during pandemic lockdowns

According to Verizon, nearly half of businesses sacrificed mobile device security best practices to “get the job done.” Image: anyaberkut, Getty Images/iStockphoto According to the Verizon Business Mobile Security Index 2021, the massive shift to remote work caused by the COVID-19 pandemic left many businesses knowingly vulnerable to attacks from employees’ mobile devices. Of the more than 850 businesses surveyed for the report, 40% said mobile devices are their company’s biggest IT security threat, yet…

Read More

Arista Boosts Agility for Modern Enterprises

Arista Boosts Agility for Modern Enterprises

CloudVision 2021 extends cognitive client to cloud experience SANTA CLARA, Calif.–(BUSINESS WIRE)– Arista Networks (NYSE:ANET) today announced CloudVision® 2021, a further expansion of Arista’s software-driven approach for modern enterprises. CloudVision 2021 delivers new automation capabilities designed to improve network agility and streamline enterprise business outcomes. “Arista’s solution provided us with the ability to deploy quickly through automation combined with high-level visibility. It saved us a lot of time, and we met the goals, which included…

Read More

How Brunswick IT enables digital business

How Brunswick IT enables digital business

Mike Adams joined Brunswick, the $4.3 billion manufacturing business, in 2017 to define its enterprise architecture function and to work with then CIO Danielle Brown to craft a modernization strategy. Since then, the company has sold off its non-marine businesses and is now fully focused on the marine market (its brands include Boston Whaler, SeaRay, and Mercury), which allows for a streamlined customer digital engagement strategy. Promoted to CIO last fall, Adams has identified three…

Read More

Privacy Concerns Raised Over Scotland’s New #COVID19 Check-In App

Privacy Concerns Raised Over Scotland’s New #COVID19 Check-In App

Concerns have been voiced by leading data privacy advocates regarding a new COVID-19 venue check-in app announced by the Scottish government. The app, Check In Scotland, which is separate from the Protect Scotland contact tracing app, requires citizens to check into venues as the country reopens from pandemic-induced lockdowns. As outlined on the Scottish government’s website, “Check In Scotland is a way to collect the contact details of people who visit a wide range of…

Read More

A new headache – ransomware extortionists emailing your customers

A new headache – ransomware extortionists emailing your customers

Cybercriminal extortionists have adopted a new tactic to apply even more pressure on their corporate victims: contacting the victims’ customers, and asking them to demand a ransom is paid to protect their own privacy. At the end of March, Bleeping Computer reported that the Clop ransomware gang had not stopped at threatening hacked companies and contacting journalists, but had taken the additional step of direct emailing victims’ customers whose details had been found in stolen…

Read More

Designing Fault Tolerant Data Centers of the Future – Cisco Blogs

Designing Fault Tolerant Data Centers of the Future – Cisco Blogs

System crashes. Outages. Downtime. These words send chills down the spines of network administrators. When business apps go down, business leaders are not happy. And the cost can be significant. Recent IDC survey data shows that enterprises experience two cloud service outages per year. IDC research conservatively puts the average cost of downtime for enterprises at $250,000/hour. Which means just four hours of downtime can cost an enterprise $1 million. To respond to failures as…

Read More

How Cisco Supported Me During the Texas Winter Storm – Cisco Blogs

How Cisco Supported Me During the Texas Winter Storm – Cisco Blogs

Texas is a state known for many things – extreme winter weather isn’t one of them. But there we were, with a week of weather that dipped well below our average temperatures into single digits. My mom and I sat in our car for three hours, trying to generate warmth, and put on our best Survivor impression as we watched the news of over 4 million Texans being impacted by this unprecedented winter storm. Texans…

Read More

SAP systems are targeted within 72 hours after updates are released

SAP systems are targeted within 72 hours after updates are released

On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm Onapsis warns. According to a joint study published by Onapsis and SAP, on-premises SAP systems are targeted by threat actors within 72 hours after security patches are released. Threat actors perform reverse-engineering of the SAP patches to create their own code to exploit recently addressed vulnerabilities and use them to target SAP installs. SAP and…

Read More

Cybersecurity Industry Must Find Solutions for Third Party Data Security

Cybersecurity Industry Must Find Solutions for Third Party Data Security

Organizations must take more responsibility for the security of third party providers that access their data, according to experts speaking during a webinar session organized by Atakama. Moderating the discussion, Brian Herr, field CISO at Mainline Information Systems, firstly highlighted how organizations are becoming increasingly reliant on third parties, meaning growing numbers of entities are getting access to their confidential information. “Organizations are putting more data outside of their control,” he explained, adding that “the…

Read More

Oracle Cloud VMware: Solving Real Customer Challenges – VMware Cloud Community

Oracle Cloud VMware: Solving Real Customer Challenges – VMware Cloud Community

In the latest episode (below) of Cloud Executive Perspectives, VMware’s Mark Lohmeyer, SVP/GM Cloud Services caught up with Clay Magouryk, Executive VP of Oracle Cloud Infrastructure to talk about how Oracle Cloud VMware Solution solves a variety of challenges faced by customers today. Mark and Clay discuss: The genesis of Oracle Cloud VMware Solution What differentiates OCVS from other Hyperscaler solutions (hint: customer control is key along with availability zones) How Oracle Cloud VMware Solution…

Read More
1 3,666 3,667 3,668 3,669 3,670 3,766