Half of Orgs Concerned Remote Working Puts Them at Greater Risk of Cyber-Attacks

Half of Orgs Concerned Remote Working Puts Them at Greater Risk of Cyber-Attacks

Half of organizations are concerned that the shift to remote work is putting them a greater risk of cyber-attacks, according to a new study by LogMeIn in collaboration with IDG. A survey of UK CIOs, CTOs and IT decision makers revealed that insecure practices are regularly taking place among remote workers, providing more opportunities for cyber-criminals to strike. A large majority (80%) of organizations admitted that a portion of their workforce use personal computers to…

Read More

Cisco Completes Acquisition of Acacia – Cisco Blogs

Cisco Completes Acquisition of Acacia – Cisco Blogs

I’m excited to announce that Cisco has completed its acquisition of Acacia Communications, Inc., a company that designs and manufactures high-speed optical interconnect products and technologies. Acacia’s technology is very complementary to Cisco’s optical systems and optics strategy and reinforces its investment in the Internet for the Future with world-class coherent optical solutions for our customers. Acacia offers a complete portfolio of long-distance data transmission solutions that address the full range of applications in the…

Read More

Proofpoint Elects Elizabeth Rafael to its Board of Directors | Proofpoint US

Proofpoint Elects Elizabeth Rafael to its Board of Directors | Proofpoint US

Sunnyvale, Calif.— March 1, 2021 – Proofpoint, Inc., (NASDAQ: PFPT), a leading next-generation cybersecurity and compliance company, today announced its Board of Directors has elected Elizabeth (“Betsy”) Rafael as a new independent director, effective Thursday, February 25, 2021. Ms. Rafael has also been appointed as the chair of Proofpoint’s audit committee. Ms. Rafael is currently the Audit Chair at Autodesk and Kinaxis. She most recently served as Chief Transformation Officer at GoDaddy Inc. from May 2018…

Read More

Third-Party Software Security Scanning – Cisco Blogs

Third-Party Software Security Scanning – Cisco Blogs

This blog is co-authored by Nur Hayat and is part two of a four-part series about DevSecOps. Earlier in this series we covered how Continuous Security Buddy (CSB) for continuous integration/continuous delivery (CI/CD)—CSB for CI/CD —provides an automation framework for holistic, continuous security based on DevSecOps principles. In this blog, let’s take a closer look at software composition analysis, with a focus on security scanning of third-party software components in Cisco software. As the use…

Read More

Security magazine announces 2021 Top Cybersecurity Leaders recipients

Security magazine announces 2021 Top Cybersecurity Leaders recipients

Security magazine announces 2021 Top Cybersecurity Leaders recipients | 2021-03-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Creating and merging PDFs on Linux

Creating and merging PDFs on Linux

There are a number of ways that you can create PDFs on a Linux system. You can use an application like LibreOffice or OpenOffice, or you can take advantage of any of a number of commands that can generate PDFs from text files or from a group of other file formats. There are also a number of ways that you can merge a group of PDFs into a single PDF file. Why PDFs? PDF is…

Read More

IBM brings Red Hat to Power systems

IBM brings Red Hat to Power systems

IBM has introduced Red Hat Linux on its RISC-based Power systems, further expanding IBM’s private- and hybrid-cloud offerings on the traditionally Unix-based hardware. IBM already has what it calls Enterprise Linux on Power, but this is bringing Red Hat, which IBM paid $34 billion to acquire, to its big iron. IBM Power systems now feature Red Hat OpenShift on IBM Power Virtual Server leveraging OpenShift’s bare metal installer, Red Hat Runtimes, and newly certified Red Hat…

Read More

Self-Assessment Tool Launches to Enhance Small Biz Security

Self-Assessment Tool Launches to Enhance Small Biz Security

Sole traders and micro-businesses now have some extra cybersecurity support after the UK authorities launched a new online self-assessment tool. The free service is being provided by the GCHQ-backed National Cyber Security Center to the country’s smallest businesses who, like most others, have been working remotely during the pandemic. It’s a group the government believes is particularly at risk as they may typically lack the resources of even SMBs to devote to enhanced cyber-protection. This can…

Read More

7 ways COVID-19 has changed IT forever

7 ways COVID-19 has changed IT forever

COVID-19 struck IT like a tsunami in early 2020, sweeping away long-established operations and processes, forcing CIOs to quickly identify and deploy acceptable alternatives. Now, as the virus threat appears to be gradually receding, IT leaders are viewing a radically transformed landscape, wondering how essential operations and practices will fit into a “new normal” business world. The pandemic reshaped enterprises in an almost endless number of ways. IT, too, has felt the impact, leaving CIOs…

Read More

The 2021 Top Cybersecurity Leaders

The 2021 Top Cybersecurity Leaders

The 2021 Top Cybersecurity Leaders | 2021-03-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 20 21 22 23 24 268