6G: Vast and mysterious promises

6G: Vast and mysterious promises

I know what you’re thinking. “6G? He wants to blather on about 6G, when we barely have 5G?” 5G resources What is 5G? Fast wireless technology for enterprises and phones How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Point taken. But 5G’s seemingly interminable rollout should…

Read More

CRN 5-Star Awards: A Lot Can Happen in 10 Years – Cisco Blogs

CRN 5-Star Awards: A Lot Can Happen in 10 Years – Cisco Blogs

2012 was a memorable year. The London Olympics were stunning, with 205 nations participating. In tech, the car-share service Lyft was founded and today provides over one million rides daily. Facebook went public, purchased Instagram and announced that it reached one billion active users. I’m sure we all remember that 2012 was the year Cisco won our first 5-Star rating in CRN’s Partner Program Guide.  The annual program guide is an IT industry touchstone for…

Read More

Initiatives to enable progress: Taking action during a global pandemic – Cisco Blogs

Initiatives to enable progress: Taking action during a global pandemic – Cisco Blogs

The following is an excerpt from the 2020 CSR Impact Report, published on December 8, 2020. Cisco employees continue to seek ways to make an impact, especially during this difficult time. We made this easier by doubling the number of paid days off available for employees to volunteer from five to 10 in 2020. In addition, we increased the annual match for employee giving and volunteering from US$10,000 to US$25,000. Disaster response campaigns launched to address…

Read More

Linux 101: How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions

Linux 101: How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions

New Linux admins need to know how to give and take sudo privileges from users. Jack Wallen shows you how on both Ubuntu- and Red Hat-based Linux distributions. Image: Pixabay Most users on your Linux machines might be non-admins who use services and directories for various purposes. However, you might come into a situation when you need to “promote” one of those users to admin and give them sudo privileges.  How do you do that? …

Read More

5 Ways MVISION XDR Innovates with MITRE ATT&CK   | McAfee Blogs

5 Ways MVISION XDR Innovates with MITRE ATT&CK   | McAfee Blogs

The MITRE ATT&CK® Framework proves that authority requires constant learning and the actionable information it contains has never held greater currency. Likewise, XDR, the category of extended detection and response applications, is quickly becoming accepted by enterprises and embraced by Gartner analysts, because they “improve security operations productivity and enhance detection and response capabilities.”   It is less well known how these tools align to improve the efficacy of your cybersecurity defenses leveraging key active cyber security industry frameworks. In MVISION XDR there’s a dynamic synergy between the MITRE ATT@CK Framework and…

Read More

ClubCISO Appoints Stephen Khan as its New Chair

ClubCISO Appoints Stephen Khan as its New Chair

ClubCISO, the international community of chief information security officers and security leaders, has announced the appointment of Stephen Khan as its new chair. Khan is head of technology and cybersecurity risk at HSBC Group Information Security Risk, and is also the current chair of the White Hat Ball. Khan has replaced Dr Jessica Barker as chair at ClubCISO, who will remain on the non-commercial organizations’ advisory board after serving two years as chair. Khan will…

Read More

Hades Ransomware Linked to Hafnium and Exchange Attacks

Hades Ransomware Linked to Hafnium and Exchange Attacks

Security experts have linked the Hades ransomware operation to the Hafnium state-backed group that was behind early attacks on Microsoft Exchange servers. The ransomware crew was responsible for attacks on trucking giant Forward Air and a handful of others. It has been linked to infamous Russian cybercrime operation Evil Corp (Indrik Spider), as a new variant of its WasterdLocker ransomware, designed to help the group escape sanctions that would discourage victims to pay up. However,…

Read More

Innovation in Ultra-Low Latency Network Solutions – Cisco Blogs

Innovation in Ultra-Low Latency Network Solutions – Cisco Blogs

Cisco expands and strengthens the Nexus ULL Network Solutions portfolio with two new products.   Innovative Cisco Nexus 3550-T Programmable Switch Platform The Cisco Nexus® 3550-T is a new innovative application platform built on software-defined hardware designed to run FPGA network applications. The Nexus 3550-T initially operates as a very fast top-of-rack configurable 48-port low-latency Layer 3 switch built around a flexible programmable FPGA device. The Nexus 3550-T has the performance characteristics of hardware combined…

Read More

Knowing where the line is in IT risk management

Knowing where the line is in IT risk management

Every organization should have an agreed understanding of risk, what that means for the company, and where the line of acceptability is (threshold). Knowing where this line is, and using it as a driving force for decision making within IT, can dramatically maximize resources and decrease costs.  Decision making Risk Management sometimes has the unfortunate nickname of being titled the Business Prevention Unit (BPU), but actually, that name couldn’t be further from the truth. Robust…

Read More

Infosecurity Magazine Spring Online Summit Now Available On-Demand

Infosecurity Magazine Spring Online Summit Now Available On-Demand

Last week (March 23 and 24) Infosecurity Magazine hosted its annual Spring Online Summit – a two-day virtual event showcasing 14 live, CPE-accredited sessions moderated by the Infosecurity editorial team, featuring an array of experts and thought-leaders discussing various topics and issues currently impacting the information security industry. Infosecurity is delighted to announce that the full event is now available to watch on-demand via the Infosecurity website. The immersive education program includes keynote presentations from…

Read More
1 3,533 3,534 3,535 3,536 3,537 3,876