Cisco and SOLUM Team Up to Deliver IoT Simplicity   – Cisco Blogs

Cisco and SOLUM Team Up to Deliver IoT Simplicity   – Cisco Blogs

Application Hosting on the Catalyst 9100 series access points is a simplified way of deploying IoT infrastructure without the added headache or costs of overlay networks. It enables IoT vendors to integrate their applications directly onto Cisco Catalyst Access Points (APs) and drive intelligence at the edge. With use cases ranging from healthcare and carpeted enterprise to retail and hospitality, Application Hosting is reinventing the way organizations deploy and manage IoT services. We announced Application…

Read More

Delivering simplified cybersecurity to small businesses

Delivering simplified cybersecurity to small businesses

Virtually every week brings news of yet another high-profile cybersecurity attack on citizens, companies or governments. Over the last year, large parts of our world moved online. This unprecedented, large-scale digital migration has also made us ever more exposed to cybersecurity risks. Our security stance has fundamentally changed as the pandemic accelerated the transition of applications. Disruption brought about by the crisis is an opportunity to embed security, not an excuse to skip it. Size…

Read More

Top 5 Reasons I Love Working at Cisco – Cisco Blogs

Top 5 Reasons I Love Working at Cisco – Cisco Blogs

Have you ever hit the character limit on an Instagram post? I have – and it was all because I was sharing my #LoveWhereYouWork story during the annual #WeAreCisco #LoveWhereYouWork contest! From the moment I found out about the possibility of being contracted to work for Cisco as a SocialBridge Agent – and heard about their values and culture, it seriously sounded like a dream job. I thought to myself, “There’s no way a company…

Read More

Biden Executive Order Mandates Zero Trust and Strong Encryption

Biden Executive Order Mandates Zero Trust and Strong Encryption

President Biden has issued a long-awaited executive order (EO) designed to improve supply chain security, incident detection and response and overall resilience to threats. Although every President in recent years has issued an order to improve the nation’s cybersecurity, experts believe this one is more detailed and has a better chance of success than previous efforts. It also comes amidst unprecedented attacks on US government and critical infrastructure, in the form of the SolarWinds, Exchange Server…

Read More

Colonial Pipeline Attackers Linked to Infamous REvil Group

Colonial Pipeline Attackers Linked to Infamous REvil Group

The DarkSide ransomware group blamed by the US government for a crippling attack on a major East Coast fuel pipeline has been linked to a notorious variant used in extortion attacks against Apple and Donald Trump. The DarkSide variant first appeared in around August 2020, but after a few months of operating it themselves, its Russian-speaking owners opened it up to affiliates, as most ransomware groups do today. Researchers at Flashpoint claimed with “moderate confidence”…

Read More

AMD chips keep claiming more of the server market

AMD chips keep claiming more of the server market

AMD saw another quarter of outstanding growth in sales of its server chips, giving the company its highest single-quarter gain for server CPUs since 2006 and eating into Intel’s most valuable market segment, according to the latest market report from Mercury Research. We’ll get to the desktop segment later, but AMD’s server CPU share grew 1.8 percentage points from Q4 2020 to Q1 2021, from 7.1% to 8.9%. That is astonishing as server numbers just…

Read More

12 cyber security questions to ask your CISO – IT Governance UK Blog

12 cyber security questions to ask your CISO – IT Governance UK Blog

Cyber security affects companies of all sizes in all sectors. Moreover, threats are constantly evolving and your legal and regulatory requirements have become major issues – particularly with the introduction of the the GDPR (General Data Protection Regulation) and NIS Directive. All of this means that regular communication between management and the board regarding cyber security is more important than ever. It’s only by discussing these issues regularly and in a formal environment that you can…

Read More

Cybercriminals exploit these cognitive biases the most

Cybercriminals exploit these cognitive biases the most

Cybercriminals exploit these cognitive biases the most | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Learnings from the Colonial Pipeline cyberattack: focus on the 98% of attacks, not the 2%!

Learnings from the Colonial Pipeline cyberattack: focus on the 98% of attacks, not the 2%!

Learnings from the Colonial Pipeline cyberattack: focus on the 98% of attacks, not the 2%! | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

The state of loss prevention and asset protection

The state of loss prevention and asset protection

The state of loss prevention and asset protection | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 3,458 3,459 3,460 3,461 3,462 3,913