How CISOs Can Impact Security for All – Cisco Blogs

How CISOs Can Impact Security for All – Cisco Blogs

Insights from our new Advisory CISO, Helen Patton If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton, our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years. And before that she spent about 10 years as a security leader at JPMorgan Chase. She recently shared with me just how many different…

Read More

Supporting Cisco Partners in a Changing World – Cisco Blogs

Supporting Cisco Partners in a Changing World – Cisco Blogs

The global pandemic of the past year has resulted in sudden and unexpected changes in all aspects of how we live and work. Everything we do, and how we do it, has been subject to re-evaluation and change. What’s at the center of this unprecedented and challenging time, as we adapt, pivot and create new and innovative approaches in all that we do at Cisco?  Communication: it’s a key factor that shapes how and when…

Read More

F5 & Cisco ACI Essentials – Dynamic pool sizing using the F5 ACI ServiceCenter – Cisco Blogs

F5 & Cisco ACI Essentials – Dynamic pool sizing using the F5 ACI ServiceCenter – Cisco Blogs

This blog is a joint collaboration between Ravi Balakrishnan (Cisco) and Payal Singh (F5). It is the third in a series. APIC EndPoints and EndPoint Groups When dealing with the Cisco ACI environment you may have wondered about using an Application-Centric Design or a Network-Centric Design. Both are valid designs. Regardless of the strategy, the ultimate goal is to have an accessible and secure application/workload in the ACI environment. An application is comprised of several servers;…

Read More

The bank of the future at the push of a button – Cisco Blogs

The bank of the future at the push of a button – Cisco Blogs

Online banking has almost become the standard, so that banks are using fewer and fewer employees on site. But many customers still want personal advice in the branch. Ratiodata Video Consult offers a practical solution here. Financial advice by video in the bank branch of the VR-Bankverein Bad Hersfeld-Rotenburg eG. “I’ve been a customer of the bank since 1954 when I earned my first money – that was twelve D-Marks and 32 pfennigs,” recalls a long-established citizen…

Read More

The Journey to Automating Network Troubleshooting with Machine Reasoning – Cisco Blogs

The Journey to Automating Network Troubleshooting with Machine Reasoning – Cisco Blogs

In my role at Cisco as Distinguished Engineer, I’ve been working on how to simplify network management for our customers. Networks are becoming too complex to operate manually. Troubleshooting a network problem involves managing and applying reasoning over very large volumes of data. It is predominantly a high-touch, time-consuming, and error prone endeavor. It’s a task reserved for “masters of complexity”—network administrators who have amassed over decades of work the required expert knowledge to diagnose…

Read More

Dell Technologies Safeguards IT Environments with New Security Service Powered by Secureworks | Dell Technologies

Dell Technologies Safeguards IT Environments with New Security Service Powered by Secureworks | Dell Technologies

ROUND ROCK, Texas and ATLANTA, April 26, 2021 /PRNewswire/ — News summary New Dell Technologies Managed Detection and Response service powered by Secureworks® Taegis™ XDR secures businesses’ IT environments with fully managed, 24/7 service monitoring, detection and response to threats With an easy-to-consume subscription model, companies with 50 or more endpoints can take advantage of Managed Detection and Response to get expert assistance for quick threat remediation and recovery Secureworks Taegis XDR security analytics software…

Read More

Special Offer: Upgrade Your ISR G2 or 4000 to a Catalyst 8000 – Cisco Blogs

Special Offer: Upgrade Your ISR G2 or 4000 to a Catalyst 8000 – Cisco Blogs

The cloud requires powerful, reliable throughput. There are more devices connecting than ever before. Security must be effective but cannot slow service. Your stakeholders expect a safe, optimal experience at all times, whether it’s an important email, a factory machine or video interview. Today, network interruptions can shut down business. Yet, when you look under that desk or in that closet, you still have an old router. Isn’t it time for an Edge Platform?  Catalyst…

Read More

5G research by DARPA will lead to commercial applications

5G research by DARPA will lead to commercial applications

The U.S. military is devoting time and resources into research on improving the signal quality and security of 5G–efforts that, if history is any indication, eventually will result in technologies that are available to commercial enterprises. As Breaking Defense reports, the Defense Advanced Research Projects Agency (DARPA) has awarded roughly $500,000 in “exploratory” funding to wireless startup MixComm to demonstrate whether silicon-based millimeter wave (mmWave) power amplifiers can economically boost radio signals so the Department…

Read More

Microsoft’s Nuance deal might trigger a new IT spending wave

Microsoft’s Nuance deal might trigger a new IT spending wave

OK, help me understand this. Microsoft just spent almost $20 billion to buy Nuance, the company that supplies the popular Dragon speech-to-text tool. Microsoft already has speech-to-text available in Windows 10 and through Azure, and even a partnership with Nuance. Nuance’s single big jump in stock price in its history coincides with Covid and WFH, which is now (hopefully) passing. Nuance revenue boom? Apparently, ending. The Dragon product? Incremental to Microsoft’s current position. Health care…

Read More

Organizations need to patch Pulse Secure VPNs

Organizations need to patch Pulse Secure VPNs

Organizations using Pulse Secure’s mobile VPN should patch vulnerabilities reportedly being exploited in the wild, possibly by a “Chinese espionage actor”. The patch–available here–is considered important enough that the Cybersecurity and Infrastructure Security Agency (CISA) gave federal agencies a deadline of April 23 to apply them. CISA’s guidance states that federal users of Pulse Connect Secure VPNs must use the company’s free utility to ascertain whether their devices are vulnerable. If the vulnerability is found,…

Read More
1 1,027 1,028 1,029 1,030 1,031 1,147