Take the Unhackable MFA Challenge

Take the Unhackable MFA Challenge

Today more than ever, it is critical to protect our family and friends, both online and off. This Unhackable MFA challenge is a simple pledge that anyone can make and can have a major impact on everyone’s online safety. Therefore, we are challenging every Cisco employee, cyber fan, security and IT Pro and Unhackable podcast listener to take a small step and contact someone right now to tell them you’ll help them with MFA. Take…

Read More

Linux distributors frustrated by Google’s new Chromium web browser restrictions | ZDNet

Linux distributors frustrated by Google’s new Chromium web browser restrictions | ZDNet

While Google Chrome is easily the most popular PC web browser, it’s open-source big brother, Chromium, doesn’t have that many users, but it’s always had some fans on desktop Linux. Now, though, that love affair is in trouble. Google claims it recently found un-named third-party Chromium-based browsers integrating Google cloud-based features, such as Chrome sync and Click to Call, that were intended only for Google Chrome users. In other words, “This meant that a small…

Read More

Cloud-based Solutions can Empower Financial Services Companies to Adapt While Cutting Costs – Cisco Blogs

Cloud-based Solutions can Empower Financial Services Companies to Adapt While Cutting Costs – Cisco Blogs

IT professionals in financial services have been instrumental to ensuring the integrity of global financial markets over the last year. Their hard work has helped keep the world’s largest economies working and financial aid flowing to those who need it most.  For them, few things remain unchanged from the pre-COVID world. Many network engineers had their hands full supporting large scale migrations to remote working. But aside from that, one constant during this time of…

Read More

Cisco introduces Fastlane+ with advanced multi user scheduling to revolutionize real-time application experience – Cisco Blogs

Cisco introduces Fastlane+ with advanced multi user scheduling to revolutionize real-time application experience – Cisco Blogs

Cisco and Apple continue to work together to deliver better experiences for customers through collaboration and co-development. Our latest project, Fastlane+, builds on the popular Fastlane feature by adding Advanced Scheduling Request to take QoS management a step further by scheduling and carving out airtime for voice and video traffic on Wi-Fi 6 capable iPhone and iPad. This facilitates a superior experience with latency-sensitive collaboration applications such as WebEx and FaceTime. What is FastLane+, and…

Read More

Using vim to quickly encrypt and decrypt files

Using vim to quickly encrypt and decrypt files

Any time you have a text file on a Linux system that you want to keep private regardless of the privileges that other users with accounts on the system may have, you can resort to encryption. One easy way to do this is to use a feature that is built into the vim editor. You will have to provide a password that will you then need to remember or store in a password safe, but…

Read More

Bridging the datacenter and edge dichotomy – Cisco Blogs

Bridging the datacenter and edge dichotomy – Cisco Blogs

For the past 10+ years, IT teams have been focused on consolidating workloads within small numbers of modern, virtualized datacenters and public clouds, but the concept of edge computing is the complete opposite of that.  Deploying and managing tens to thousands of sites at the network edge presents some new challenges and layers of complexity that don’t exist when deploying infrastructure in highly specialized environments like datacenters that are designed to have ideal power, cooling,…

Read More

Understanding Container Images, Part 1: Image Layers

Understanding Container Images, Part 1: Image Layers

You are probably using containers for your development work (and if you aren’t – you should really consider it). They behave so close to having a customized virtual machine, with almost instant-on startup that it’s easy to forget they’re not really virtual machines… nor should be treated as one!. I prefer to think on container images not as a virtual machine, but as a (quite advanced) packaging system with good dependency tracking. It helps to…

Read More

Why Trust and Responsibility Are Key CSR Issues for Cisco – Cisco Blogs

Why Trust and Responsibility Are Key CSR Issues for Cisco – Cisco Blogs

The following is an excerpt from the 2020 CSR Impact Report. Cisco’s networking, security, collaboration, and cloud solutions help secure and protect the lifeblood of the global economy. More than 80 percent of the world’s web traffic travels securely across Cisco connections, and our software and solutions protect and keep private the data of over 500,000 organizations, from the public sector, to critical infrastructure, to the Fortune 500. Given the critical nature of the solutions we…

Read More

Cisco Secure Endpoint named an Endpoint Prevention and Response (EPR) Leader – Cisco Blogs

Cisco Secure Endpoint named an Endpoint Prevention and Response (EPR) Leader – Cisco Blogs

AV-Comparatives named Cisco a Strategic Leader in its EPR report Cisco Secure Endpoint (previously AMP for Endpoints) was named a Strategic Leader by AV -Comparatives in the Endpoint Prevention and Response (EPR) CyberRisk Quadrant in their inaugural EPR Comparative Report. AV-Comparatives is a leading independent endpoint security software testing organization withtwo decades of experience. The EPR report assessed how effective endpoint security products are at preventing, detecting, and responding to targeted attacks. It consists of…

Read More

Logicalis Provides True Biometric Security for the Evolving Workforce, Built with Cisco Security – Cisco Blogs

Logicalis Provides True Biometric Security for the Evolving Workforce, Built with Cisco Security – Cisco Blogs

Co-Authored by Fabio Hashimoto, Logicalis Insider threats—such as credential theft, criminal insiders, or even negligent employees—are growing dramatically and represent enormous risks for all companies. This is true around the world, as low-skilled, untrained workforces become especially vulnerable to cybercriminals, putting company assets at risk. Enabling remote access to a virtual workforce, for example, can create easy targets for cyber-attack. In response, a Latin America based team from Cisco Global Gold Certified Partner Logicalis took…

Read More
1 1,087 1,088 1,089 1,090 1,091 1,139