Cisco DNA Spaces Ecosystem Partner Spotlight: Pointr

Cisco DNA Spaces Ecosystem Partner Spotlight: Pointr

Cisco DNA Spaces, together with its ecosystem partners, enables outcomes at scale for customers across multiple industries. Customers can seamlessly discover and activate vertical and use case specific apps in the Partner App Center and find a diverse set of compatible end devices in the IoT Device Marketplace. We are excited to introduce our new Cisco DNA Spaces App Center Partner series. For today’s feature App Center Partner, we expand on the amazing things that…

Read More

CISOs Must Develop Emotional Intelligence Skills to Succeed

CISOs Must Develop Emotional Intelligence Skills to Succeed

Emotional intelligence is becoming an increasingly important skill for CISOs to master as their roles continue to broaden, according to a new study by F-Secure. A series of interviews conducted with relatively small number of CISOs (28) from the US, UK and other European countries suggested that the role of CISO is no longer purely technical in nature. Two-thirds said they understood the growing importance of emotional intelligence in enabling them to understand, empathize and…

Read More

YouTube Terminates 3000 Channels in Russia and China Clampdown

YouTube Terminates 3000 Channels in Russia and China Clampdown

YouTube has taken down almost 3000 channels and accounts deemed to part of separate Chinese and Russian state coordinated influence operations. The vast majority of the work involved the removal of 2946 YouTube channels deemed to be part of a Chinese influence operation, according to Google’s Threat Analysis Group director, Shane Huntley. “These channels mostly uploaded spammy content in Chinese about music, entertainment and lifestyle,” he explained in a TAG bulletin for Q1 2021. “A very…

Read More

Data-center training, recruitment need to change to meet staffing demand

Data-center training, recruitment need to change to meet staffing demand

As demand for data-center capacity has surged, owners and operators are struggling to keep pace on the employee side. Improved outreach, more creative approaches to recruitment, and better training and education opportunities are needed to ensure the data-centers can meet the “astronomical anticipated demand” for skilled people, said Rhonda Ascierto, vice president of research at Uptime Institute. The research firm’s newly released Global Data Center Staffing Forecast reveals concern about the volume of open jobs…

Read More

Centreon: Sandworm Attacks Targeted Legacy Open Source Product

Centreon: Sandworm Attacks Targeted Legacy Open Source Product

French software provider Centreon has hit back at a report from the country’s cybersecurity agency that its products were hijacked in a Russian cyber-campaign, claiming that no paying customers were affected. The firm, which produces IT monitoring software not unlike SolarWinds, was at the center of a report from the French National Agency for the Security of Information Systems (ANSSI) this week. It claimed that the infamous Sandworm group, responsible for destructive attacks against Ukrainian energy…

Read More

North Korea Allegedly Targets Pfizer to Steal #COVID19 Vaccine Data

North Korea Allegedly Targets Pfizer to Steal #COVID19 Vaccine Data

North Korea has attempted to hack into COVID-19 vaccine data from US pharma giant Pfizer, it has been claimed. As reported by the BBC, South Korea’s National Intelligence Agency has briefed law makers about the alleged cyber-attack, although it is unclear whether any data has been stolen. Pfizer is one of several pharma companies that have developed and received approval for a vaccine designed to protect against coronavirus in recent months. However, the development and…

Read More

Putting the global in GSOCs: How to build a comprehensive digital risk protection approach

Putting the global in GSOCs: How to build a comprehensive digital risk protection approach

Putting the “global” in GSOCs: How to build a comprehensive digital risk protection approach | 2021-02-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Accidental database breaches are on the rise – How can your company avoid becoming the next headline?

Accidental database breaches are on the rise – How can your company avoid becoming the next headline?

Accidental database breaches are on the rise – How can your company avoid becoming the next headline? | 2021-02-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

VERT at the Movies: Cybergeddon | The State of Security

VERT at the Movies: Cybergeddon | The State of Security

While I was teaching, one of my students asked if I had seen Cybergeddon, a film distributed by Yahoo! in 2012. I had not, so I decided it would be fun for VERT to watch the film and review it, since my hobby is writing film reviews for RotundReviews. Cybergeddon is not talked about as much as it should be given some of the background around it. It should be noted that while we’ll reference…

Read More

Smart ways to compare files on Linux

Smart ways to compare files on Linux

Commands for comparing files have proliferated since the early days of Linux. In this post, we’ll look at a suite of commands available for comparing files and highlight the advantages that some of the newer ones provide. diff One of the oldest and still popular commands for detecting and reporting on file differences is the diff command. Comparing two lists of meeting attendees, the diff command will simply and clearly show you the differences. $…

Read More
1 51 52 53 54 55 268