Bridging the Gap Between Provisioning and Customer Experience

Bridging the Gap Between Provisioning and Customer Experience

Working closely with customers who develop and deploy network automation, I’ve often heard the question: “Is the configured network service actually delivered according to customer expectations?” This is not just theoretical; it reflects a real-world challenge many service providers face. It can be difficult to get the right configuration in place in time for any vendor. But even once it’s done, you may realize the customer still hasn’t received the right service, though the network…

Read More

Riverbed bolsters AIOps platform with predictive and agentic AI

Riverbed bolsters AIOps platform with predictive and agentic AI

Shamus McGillicuddy, research director for the network management practice at Enterprise Management Associates (EMA), explains Riverbed’s Data Store approach as an enabling technology to Riverbed’s overall observability platform that references multiple siloed databases and uses AI to intelligently gather only the data that is relevant to a given operation. “For instance, if someone wants to troubleshoot a problem, Data Store will find all data relevant to that problem across multiple tools. This is a nimble…

Read More

Microsoft’s April 2025 Patch Tuesday Addresses 121 CVEs (CVE-2025-29824)

Microsoft’s April 2025 Patch Tuesday Addresses 121 CVEs (CVE-2025-29824)

11Critical 110Important 0Moderate 0Low Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild. Microsoft patched 121 CVEs in its April 2025 Patch Tuesday release, with 11 rated critical and 110 rated as important. This month’s update includes patches for: ASP.NET Core Active Directory Domain Services Azure Local Azure Local Cluster Azure Portal Windows Admin Center Dynamics Business Central Microsoft AutoUpdate (MAU) Microsoft Edge (Chromium-based) Microsoft Edge for iOS Microsoft Office Microsoft…

Read More

Online Account Security

Online Account Security

Online accounts are integral to cloud computing, encompassing private, public, and hybrid services that store vast amounts of data across servers and datacenters. These accounts include: Email platforms Social media accounts Knowledge bases Professional web-based tools Like any digital asset, online accounts are vulnerable to cyber-attacks. The consequences of sabotage, espionage, or diversion could be catastrophic, potentially destabilizing networks that serve millions of users. The Risks of Online Account Vulnerability Online accounts are critical assets…

Read More

China’s rare earth export controls threaten enterprise IT hardware supply chains

China’s rare earth export controls threaten enterprise IT hardware supply chains

“AI-first infrastructure rollouts — particularly those involving GPUs, edge accelerators, and high-efficiency cooling — are directly in the crosshairs,” Gogia noted. “So are quantum computing R&D efforts and high-reliability storage systems where thermal and magnetic materials matter.” China, responsible for 70% of global rare earth mining output and 87% of refined supply, poses a serious threat to enterprise IT hardware supply chains with these restrictions — especially for companies with AI-optimized server lines. AI chip…

Read More

Data's dark secret: Why poor quality cripples AI and growth

Data's dark secret: Why poor quality cripples AI and growth

Data is the foundation of innovation, agility and competitive advantage in today’s digital economy. As technology and business leaders, your strategic initiatives, from AI-powered decision-making to predictive insights and personalized experiences, are all fueled by data. Yet, despite growing investments in advanced analytics and AI, organizations continue to grapple with a persistent and often underestimated challenge: poor data quality. Your role in addressing this challenge is crucial to the success of your organization.   Fragmented systems,…

Read More

Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges

Half of Firms Stall Digital Projects as Cyber Warfare Risk Surges

Critical digital transformation projects are being delayed and halted due to a perceived increase in the risk of state-sponsored cyber-attacks, according to Armis. The security vendor’s 2025 Armis Cyberwarfare Report is based on a study of over 1800 global IT decision-makers (ITDMs), including 501 from the UK, and proprietary data from Armis Labs. It found that 49% of responding UK organizations have experienced disruption to digital projects due to the threat of “cyber warfare” attacks….

Read More

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

From Firewalls to AI: The Evolution of Real-Time Cyber Defense

The traditional Intrusion Detection Systems (IDS) have depended on rule-based or signature-based detection, which are challenged by evolving cyber threats. Through the introduction of Artificial Intelligence (AI), real-time intrusion detection has become more dynamic and efficient. Today we’re going to discuss the various AI algorithms that can be investigated to identify what works best when it comes to identifying anomalies and threats in firewall security. Exploring AI Algorithms for Intrusion Detection Random Forest (RF) is a machine learning algorithm that generates several decision trees and aggregates their predictions in order to classify network traffic as malicious or normal. RF is extremely popular in IDS due to its fast processing, interpretability, and ability…

Read More

How Cisco’s Focus On Talent Transformed My Tech Career

How Cisco’s Focus On Talent Transformed My Tech Career

This post was authored by Khushi Saxena, a technical consulting engineer intern on the Customer Experience Team. I never imagined that a global giant like Cisco would notice someone like me — yet here I am, living proof that skills matter more than background. Coming from an entirely non-technical background, my first year of college felt like stepping into a completely different world. While others seemed to have a head start, talking about data structures,…

Read More

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild

The US top cybersecurity agency has confirmed that the critical vulnerability in file transfer solution provider CrushFTP’s product is being exploited in the wild. The authentication bypass vulnerability, CVE-2025-31161, was added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog on April 7. “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” said the security advisory. CISA strongly urged all…

Read More
1 101 102 103 104 105 4,294