Threat Explainer: Supply Chain Attacks

Threat Explainer: Supply Chain Attacks

Let’s say that you’re confident in your security posture. You have endpoint protection in place, firewalls defending the perimeter, and phishing filters on incoming email. You’ve leveraged tools to check for anomalies in your network traffic, rolled out an SSO solution, and implemented processes to securely connect to the network remotely. These defenses make it harder for bad actors to compromise your organization. Strong security posture is more likely to push all bad actors to…

Read More

How does certificate-based authentication work?

How does certificate-based authentication work?

I find a few universal truths when mentioning certificates to people. Most people I speak with consider them to be a very secure concept almost without fail. However upon mentioning that I want to talk about certificates: that person’s face turns a slightly lighter shade, their eyes get a bit wider, and they have this immediate fight or flight instinct kick in. I can tell you, this is a subject that does not have to…

Read More

10 features of Windows Admin Center to streamline server administration

10 features of Windows Admin Center to streamline server administration

A lot of the value built into Windows Admin Center has to do with it being a remote-management tool that can have a lot of upside in a modern IT shop, including implementing best practices by not logging directly into servers, bringing flexibility to the management architecture, and performing admin tasks from high-DPI or touchscreen devices. Considered a complement to System Center, Admin Center is a free app, downloadable here, that runs in a browser…

Read More

Nvidia competitor Graphcore preps US initiative

Nvidia competitor Graphcore preps US initiative

A UK-based AI-chip startup is making its first moves into North American to take on Nvidia on its home turf in the enterprise with new channel and reseller partners. Founded in 2016, Graphcore makes what it calls Intelligence Processing Units (IPUs) and shipped its first product—the Colossus GC2 “massively parallel, mixed-precision floating point processor”—in 2018. In July 2020, it released its second-generation processor called GC200, but news of that was drowned out by all the…

Read More

New York Attorney General declares top ISPs committed net neutrality fraud | ZDNet

New York Attorney General declares top ISPs committed net neutrality fraud | ZDNet

When then-President Donald Trump’s Federal Communications Commission (FCC) tried to destroy net neutrality in 2017, everyone knew that millions of comments in favor of breaking net neutrality were bogus.  As then-New York Attorney General Eric Schneiderman said at the time, two million net neutrality comments were fake. Schneiderman said: “Moving forward with this vote would make a mockery of our public comment process and reward those who perpetrated this fraud to advance their own hidden agenda.”…

Read More

Top 5 cyber attacks of 2020—could they have been prevented? – Cisco Blogs

Top 5 cyber attacks of 2020—could they have been prevented? – Cisco Blogs

You can’t stop every threat, but you can mitigate damage with a zero-trust architecture. The biggest cyber attacks of 2020 have raised new concerns around enterprise security postures, practices, and policies. Would things have been different if so many enterprises hadn’t been forced to rush into a largely virtual arena? Or, had the writing already been on the wall before the pandemic? Below are five of the most significant cyber attacks of 20201. Australia-based logistics…

Read More

Cisco’s Hybrid Cloud Vision meets Black Belt Academy – Cisco Blogs

Cisco’s Hybrid Cloud Vision meets Black Belt Academy – Cisco Blogs

Today, every organization, big or small, wants to fit in within the Hybrid Cloud world. The fast-paced technology is pushing our customers to accelerate their haul to Digital and operate in a multicloud environment. Cloud has become the predominant ground for businesses to store their data and applications, while organizations who still have their data on premise are planning a rapid migration to Cloud. According to the Cisco Global Cloud Index, 94 percent of all…

Read More

See how to deal with multiple keys in a RESTCONF URL

See how to deal with multiple keys in a RESTCONF URL

When I see the same question pop up twice in a week, I know it’s something worth diving into.  Add into the mix that it relates to one of my favorite topics, RESTCONF, and it was an obvious choice for an Ask Hank blog post. I got this question over on Twitter from a Guille who identifies as a “DevNet student” (aren’t we all). “Quick question, how can I build the RESTCONF url when there…

Read More

IBM moves toward consumption-based mainframe pricing

IBM moves toward consumption-based mainframe pricing

IBM continues to tweak its venerable mainframe to keep the Big Iron among the talking points in hybrid cloud. About a year ago the company changed its 20-year mainframe software pricing scheme to make it more palatable to hybrid cloud and multicloud users who might be thinking of moving workloads off the mainframe and into the cloud. Already IBM’s Tailored Fit Pricing for the IBM Z mainframe offers two consumption-based pricing models that can help…

Read More

Your network is talking. Are you listening? 

Your network is talking. Are you listening? 

Your network. The enterprise, data center, campus, branch, and cloud. It is all yours. And you have to protect it. Well, not necessarily it (the physical), but all that it is on it (data, apps, workloads, etc.) Because we know two things; the digital transformation is real, and so are the threats that are getting into your network. Does this feel like a complex problem? It is, and you are not alone. Cisco Secure Network…

Read More
1 1,019 1,020 1,021 1,022 1,023 1,149