Why Security Can’t Be An Afterthought in DevOps

Why Security Can’t Be An Afterthought in DevOps

Through the evolution of the software development process over the last decade, our industry has seen the wide adoption of a game-changing paradigm: DevOps. Sadly, while many organizations have commissioned shiny new DevOps teams, those same organizations continue along with their decades-old approach of implementing (or neglecting) security measures. Shift left security As organizations shift left with DevOps, what does it mean to embrace shift left security? “Shift left” means that operational responsibilities shift leftward…

Read More

Four things you should know about the Cisco STEM Shadow Program – Cisco Blogs

Four things you should know about the Cisco STEM Shadow Program – Cisco Blogs

One of the best ways to discover what an occupation entails is to shadow a professional in that field as they go about in their daily work routine. Even better is trying your hand at performing some of their tasks, guided by their supervision and encouragement. That’s how the Cisco STEM Shadow Program works for scores of high school sophomore and junior students who have engaged in the 3- to 4-week summer program. Teaming up…

Read More

How this borough council CIO saved lives, built diverse teams during COVID

How this borough council CIO saved lives, built diverse teams during COVID

Paul Fleming, strategic director of resources at Blackburn with Darwen Borough Council, topped the 2021 CIO UK 100 after an incredible year in which he led the council’s digital response to the COVID-19 pandemic, pioneered a contact tracing system which became a blueprint for the UK and drove significant advances in team culture, diversity and technology modernisation. Fleming, a first-time entry to the CIO UK 100 no less, spoke at the CIO 100 ceremony about…

Read More

Episode 5: Networking and Security in the Fully Hybrid Future

Episode 5: Networking and Security in the Fully Hybrid Future

We live in a changed world. Advances in technology that were supposed to take years happened in months. Along the way, assumptions and legacy thinking gave way to urgency and a can-do .. no, must-do attitude. But one person’s chaos is another person’s opportunity. Cyber attackers have taken advantage of the disruption, scaling up their attacks against poorly defended end-points that suddenly sat in a living room, not a perimeter-protected, fire-walled corporate office. But a…

Read More

Virginia Reeling from Ransomware

Virginia Reeling from Ransomware

Virginia is fighting cyber-fires on two fronts after ransomware attacks affected both its state legislature and an agency within its executive branch.  In an attack that struck on the evening of December 12, key IT systems under the Division of Legislative Automated Systems (DLAS) were rendered inaccessible. The attack was focused on certain internal servers, impacting the General Assembly voicemail server and the General Assembly’s Legislative Information System (LIS) portal, which allows lawmakers to draft bills and…

Read More

Enterprise networking, 2022: Applying remote-work lessons as employees return to the office

Enterprise networking, 2022: Applying remote-work lessons as employees return to the office

As employees return to the office, IT teams can apply the lessons they learned supporting remote workers to transform their networks. Technologies such as SD-WAN and secure-access service edge (SASE) could continue to be useful. Network-as-a-service, (NaaS), is still in its early stages but could provide agility when it comes to acquiring network equipment. But, as the chip shortage and broader supply-chain issues continue to plague the tech industry, IT must be prepared to make…

Read More

Initial access brokers: How are IABs related to the rise in ransomware attacks?

Initial access brokers: How are IABs related to the rise in ransomware attacks?

Initial access brokers are cybercriminals who specialize in breaching companies and then selling the access to ransomware attackers. Learn how to protect your business from IABs. Image: djedzura/ iStock Ransomware attacks have increased seriously in the last two years, targeting every vertical of the corporate world. You might assume these cybercriminals are very skilled, since they are able to compromise a lot of companies; what if I told you they are maybe not as skilled…

Read More

Attaining High Application Experience for Hybrid Workspaces – Cisco Blogs

Attaining High Application Experience for Hybrid Workspaces – Cisco Blogs

The Great Return to the Office is coming. Maybe. Hybrid work is here to stay. Perhaps. Remote learning brings equality to education. Hopefully. Regardless, one aspect is certain: the way we work and learn will be constantly changing and technology will have to adapt to support collaborative experiences. According to a recent article on hybrid work in the New York Times: “A look at the New York work force, from a November survey of 188…

Read More

Presenting an Optimal Approach for SAP S/4HANA on AWS

Presenting an Optimal Approach for SAP S/4HANA on AWS

By Prashant Gupta, Christophe Boyer, and Arun Sivadas Global enterprises pivot to the cloud to address shifts in business and technology. This shift has been accelerated by disruption brought about by the Covid-19 pandemic. Enterprises operating SAP systems need to adopt a holistic migration approach for SAP S/4HANA since technical support for SAP ERP Central Component (ECC) ends in 2027. Amazon Web Services (AWS) has been running SAP workloads since 2008 with more than 90%…

Read More

CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog

CISA adds Log4Shell Log4j flaw to the Known Exploited Vulnerabilities Catalog

The U.S. CISA added 13 new vulnerabilities to the Known Exploited Vulnerabilities Catalog, including Apache Log4Shell Log4j and Fortinet FortiOS issues. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 13 new vulnerabilities to the Known Exploited Vulnerabilities Catalog, including recently disclosed Apache Log4Shell Log4j and Fortinet FortiOS flaws. Below is the list of new vulnerabilities added to the Known Exploited Vulnerabilities Catalog, which is the list of issues frequently used as attack vector by threat actors in…

Read More
1 3,393 3,394 3,395 3,396 3,397 4,356