Protecting Critical Infrastructure Against Cyberattacks

Protecting Critical Infrastructure Against Cyberattacks

Understanding how attackers get in is the critical first step to mounting an effective defense. By Sean Deuby | Director of Services, Semperis Cyberattacks in any industry cause multiple forms of damage. But attacks on public infrastructure—such as transportation systems and public utilities—can cause wholesale disruptions in daily life or threaten public safety.  The U.S. Department of Homeland Security (DHS), and its subsidiary Cybersecurity and Infrastructure Security Agency (CISA), administer the National Infrastructure Protection Plan…

Read More

The new narrative: Cybersecurity in 2022

The new narrative: Cybersecurity in 2022

The new narrative: Cybersecurity in 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

EMEAR Service Provider Summit 2022: Accelerating Innovation and Shaping the Future with You – Cisco Blogs

EMEAR Service Provider Summit 2022: Accelerating Innovation and Shaping the Future with You – Cisco Blogs

We live in an era marked by significant market disruptions and rising uncertainty. As organizations and decision-makers grapple with unprecedented economic, social, and technological changes, our Global Service Providers are at the forefront of digitization and network transformation. They are faced with challenges that have ballooned more quickly than many were prepared for due to the Covid-19 pandemic, such as: increasing consumer demand for innovative and seamless experiences with little to no latency or downtime,…

Read More

Balancing Privacy for Good – Cisco Blogs

Balancing Privacy for Good – Cisco Blogs

“The processing of personal data should be designed to serve mankind. The right to the protection of personal data is not an absolute right; it must be considered in relation to its function in society and be balanced against other fundamental rights, in accordance with the principle of proportionality.” ~ EU General Data Protection Regulation, Recital 4. Believe it or not, this is a direct quote from the GDPR. Unfortunately, we’ve seen privacy rights abused…

Read More

Accelerating research by a power of 4

Accelerating research by a power of 4

In collaboration with the national research and engineering network Internet2, Cisco is pleased to announce the completed transition of Internet2’s research and education (R&E) network traffic to a fifth-generation backbone. The new network, supported by Cisco solutions, delivers massive scale with lower CapEx, OpEx, and power draw, helping to accelerate research as it connects 37 state and regional networks throughout the United States. 4X increase in performance Cisco’s collaboration with Internet2 drives tremendous technical achievements,…

Read More

5G deployment near US airports slowed for now

5G deployment near US airports slowed for now

5G deployments are proceeding around the country, albeit more slowly, after a partial agreement between the FCC and the FAA about the potential danger of 5G transmissions generated too strong and too close to airports on bandwidths adjacent to the spectrum used by airplane altimeters. President Biden announced that Verizon and AT&T had agreed to slow deployments of 5G around major airports after consultation with the Department of Transportation, in order to assuage concerns over…

Read More

VMware Multi-Cloud Briefing: January 2022 – Cloud Blog – VMware

VMware Multi-Cloud Briefing: January 2022 – Cloud Blog – VMware

Watch the January Multi-Cloud Briefing, available now! Today, developing applications with cloud-native technologies is the de-facto standard for most organizations. 95% of new applications are built using containers1, and most of those applications run on some version of Kubernetes. Coupled with that, the services available from hyperscale cloud providers like AWS, Azure, Google Cloud Platform and others give a massive head start to creating new business opportunities and responding faster to customer needs. The challenge…

Read More

Dell expands Apex cloud and on-prem storage options

Dell expands Apex cloud and on-prem storage options

Dell Technologies is charging ahead with its Apex consumption-based sales portfolio with a total of seven new launches, while also expanding its public cloud integration for a broader multi-cloud experience for its customers. Dell sees the writing on the wall and that the future is hybrid and multicloud. Today, 92% of organizations have a multi-cloud strategy in place or underway, and 82% of large enterprises have adopted a hybrid cloud infrastructure. And a new Forrester…

Read More

6G exploratory group to be led by wireless heavyweights

6G exploratory group to be led by wireless heavyweights

The FCC has named 44 people to a technological advisory council tasked with exploring the possibilities of 6G wireless connectivity, a large proportion of the council’s members being drawn from the ranks of the country’s biggest networking-technology corporations. The chair of the committee will be a former Qualcomm executive, Dean Brenner. Intel, Cisco, Comcast, Microsoft, Nokia, Ericsson, and all of the major mobile operators are also represented on the commission’s Technological Advisory Council (TAC). Also…

Read More

US Data Breaches Surge 68% to All-Time High

US Data Breaches Surge 68% to All-Time High

The volume of publicly reported data compromises in the US soared 68% year-on-year to a record high of 1862, according to new data from the Identity Theft Resource Center (ITRC). The non-profit said the figure was 23% higher than the previous record, set in 2017. The number of victims was down 5%, continuing a recent trend as threat actors focus their efforts on collecting specific data types rather than acquiring mass troves of data indiscriminately. Ransomware…

Read More
1 3,347 3,348 3,349 3,350 3,351 4,387