How can the trucking industry secure their telematics?

How can the trucking industry secure their telematics?

The trucking sector is essential to countless other industries. Without reliable transportation, supply chains would crumble, and companies and consumers would face shortages. With so much riding on it, it’s no wonder why the industry has fully embraced technology like telematics in recent years. Telematics refers to the suite of technologies fleets use to share data between vehicles and command centers. At its most basic level, it includes things like GPS tracking, and at its…

Read More

6 Cloud Security Resources that You Should Be Using

6 Cloud Security Resources that You Should Be Using

It’s easy to get overwhelmed with the number of cloud security resources available. How do you know which sources to trust? Which ones should inform your security strategies? Which reports will actually improve your cloud security posture? Let’s first look at six cloud security guides that you should be using. These resources provide action items that you can take back to your team and use immediately. Each of these guides are from trusted industry experts…

Read More

The University of Queensland Selects Tenable to Secure World-Leading IP

The University of Queensland Selects Tenable to Secure World-Leading IP

Partnership contributes to cybersecurity scholarship for Aboriginal and Torres Strait Islander students The University of Queensland (UQ), ranked in the top 50 universities globally, has chosen Tenable®, Inc. as its Cyber Exposure solutions provider to see, predict and act to reduce cyber risk across its domestic campuses. The deployment was a result of Tenable’s strategic partnership with Baidam Solutions, an Indigenous-owned, Supply Nation Certified ICT Consultancy.  2020 saw a significant increase in cyberattacks against Australian…

Read More

7 expert tips on recruiting cybersecurity pros

7 expert tips on recruiting cybersecurity pros

HR and recruiting experts offer unique ways to find and hire cybersecurity talent. Image: iStock/iBrave According to the Cybersecurity Workforce Study, 2020 conducted by (ISC)², the global gap in 2020, for the first time ever, decreased from 4 million to 3.1 million, despite the economic challenges presented by COVID-19. Even though more cybersecurity positions are being filled than in previous years, a large gap still exists.  “Several factors are contributing to the talent gap, including how…

Read More

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

REvil ransomware gang hacked Acer and is demanding a  million ransom

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang is demanding the payment of a $50,000,000 ransom, the largest one to date. Acer is the world’s 6th-largest PC vendor by unit sales as of January 2021, it has more than 7,000 employees (2019) and in 2019 declared 234.29 billion in revenue. The ransomware gang…

Read More

Five ways we’re improving telework with SD-WAN and telemetry – Cisco Blogs

Five ways we’re improving telework with SD-WAN and telemetry – Cisco Blogs

Bad dream for an IT engineer? Try this: an executive working from home gets booted off an all-hands video meeting. Then it happens again. And again. That happened to me a couple of months ago. Fortunately, when I received the call, I could see immediately that the problem lay with the executive’s ISP, not our network. As a result, my team quickly resolved the problem and saved hours of troubleshooting time. And I slept better. Better visibility is one of several ways…

Read More

Introducing the Cisco DNA Traffic Telemetry Appliance

Introducing the Cisco DNA Traffic Telemetry Appliance

Add-ons extend the latest technology to legacy systems, like how my old TV turned smart overnight with an additional streaming player. It is even better when the supplements work in cohesion with the primary products to deliver a seamless experience.  Imagine if you could utilize the same remote to operate your TV and streaming player. The Cisco Catalyst 9000 series wired and wireless devices enable enterprises to unlock newer network infrastructure possibilities. For instance, these platforms…

Read More

Webex Is Highest-Ranked Video Conferencing Solution on G2’s Best Remote Tools 2021 List

Webex Is Highest-Ranked Video Conferencing Solution on G2’s Best Remote Tools 2021 List

Best in Class Once Again On the heels of receiving Trustradius’ “Best of” 2021 Awards, Webex has brought home more “Best of” awards. G2 has announced their 2nd annual Best Software lists, and we are excited to be the highest-ranked conferencing solution on the Top Remote Tools list. Webex also ranked as the top conferencing solution on the Best Enterprise Products list. We further retained our positioning as the highest-ranked solution in our category, an…

Read More

What’s on your Linux network?

What’s on your Linux network?

If you’d like to know what systems and devices are attached to your local network—whether out of security concerns or simple curiosity, Linux has some really great commands for providing answers. In this post, we’ll probe a small network and see how devices can be identified. nmap The first tool we’ll use is nmap, which stands for Network Mapper, an open source tool for exploring networks and doing some serious security auditing. It was designed…

Read More

What’s on your network?

What’s on your Linux network?

If you’d like to know what systems and devices are attached to your local network—whether out of security concerns or simple curiosity, Linux has some really great commands for providing answers. In this post, we’ll probe a small network and see how devices can be identified. nmap The first tool we’ll use is nmap, which stands for Network Mapper, an open source tool for exploring networks and doing some serious security auditing. It was designed…

Read More
1 3,543 3,544 3,545 3,546 3,547 3,871