SolarWinds Hackers Go Phishing

SolarWinds Hackers Go Phishing

American multinational technology company Microsoft says that the threat group behind the Microsoft and SolarWinds hack has launched a massive new phishing campaign targeting government agencies, NGOs and think tanks.  Last year, an advanced persistent threat (APT) group exploited vulnerabilities in Microsoft and SolarWinds programs to carry out a supply-chain attack that trojanized SolarWinds’ Orion business software updates to distribute malware. Nine US federal agencies and over 100 companies were targeted. According to Microsoft, Russian-based APT group…

Read More

Strategies for improving enterprise network management and security

Strategies for improving enterprise network management and security

Hire the right people, remember every essential step, and put the right security policies in place with these downloadable guides. Modern businesses rely on good networks, and it’s unlikely that’s going to change in the near future. In fact, the dramatic shift to remote and hybrid-style work is actually likely to accelerate the need for good networking technology and standards. These five TechRepublic Premium downloads can help businesses large and small enact the right networking…

Read More

Supporting a hybrid work environment is no longer an option, it’s a requirement. – Cisco Blogs

Supporting a hybrid work environment is no longer an option, it’s a requirement. – Cisco Blogs

While it’s exciting to see more organizations start to return to the office, it’s a transition that comes with a new set of questions and challenges as customers evolve to meet the flexible working needs of today.  We know our channel partners will deliver answers and solutions to shape the future of work starting with software and hardware to build a bridge for wherever and however customers need to work. To help accelerate the safe return to…

Read More

Secure Workload and Secure Firewall – Unified Segmentation

Secure Workload and Secure Firewall – Unified Segmentation

Some questions may never be answered: Tea or Coffee? Cricket or Baseball? Should I implement segmentation in my application environment with or without an agent? Well, if you’ve ever struggled with that last question, I have some good news for you in this blog. If you study the segmentation products market, you will find a significant bifurcation in approach: segmentation via an agent residing within the workload (e.g., host-based firewalls) or by a device that…

Read More

Cyber Hygiene: An ounce of prevention is worth a pound of incident response

Cyber Hygiene: An ounce of prevention is worth a pound of incident response

Today’s incident response teams operate like hospital emergency rooms (ERs). When an alert comes in—malware infection, intrusion, anomalous behavior, etc.—a specialist is called in for diagnosis and remediation. In cybersecurity, as in healthcare, good preventive care can improve outcomes and reduce costs. At Cisco,  I’ve been a part of a team responsible for imagining a preventive-care approach to cybersecurity—“cyber hygiene.” Here’s our current thinking on what’s needed. Foundation: a holistic view of digital assets The…

Read More

Service Provider Digital Initiatives Drive Sustainable Business Value – Cisco Blogs

Service Provider Digital Initiatives Drive Sustainable Business Value – Cisco Blogs

  By Curtis Price, IDC, Program Vice President, Infrastructure Service   Service Provider Digital Maturity Index In 2018, IDC developed the Service Provider Digital Maturity Index to define five levels of SP digital maturity. This index provides a roadmap to help SPs assess the progress of their digital journey versus their desired end state. The development of the Service Provider Digital Maturity Index was driven by IDC’s Service Provider Digital Readiness Survey, which analyzed the…

Read More

Cyber Pros to Take Part in Charity Challenge to Help Fight Online Crime

Cyber Pros to Take Part in Charity Challenge to Help Fight Online Crime

A new charity initiative, which aims to raise money for two organizations that help tackle online child abuse and cybercrime respectively, has been announced by a group of cybersecurity professionals based in the UK and US. Infostep 2021 will see 25 volunteers from the Infostep Challenge group of cyber pros walk a total of 19,000 miles , equivalent to a mammoth 42,212,000 steps, over the next six months. This will primarily look to raise funds…

Read More

NCSC: Act Now to Protect Streaming Accounts

NCSC: Act Now to Protect Streaming Accounts

The National Cyber Security Centre (NCSC) has warned British internet users to protect their streaming accounts ahead of a summer of sport. The GCHQ offshoot warned that such accounts can hold a trove of valuable personal and financial information for threat actors to harvest and use to make fraudulent payments or launch follow-on phishing, smishing and vishing scams. “The UEFA Champions League final will kick off a great British summer of sport and those enjoying…

Read More

Energy company deploys edge devices to improve drilling efficiency

Energy company deploys edge devices to improve drilling efficiency

Moving compute and storage resources to edge locations can reduce latency and bandwidth needs, improve performance and save money. At the same time, widespread edge computing deployments can introduce significant management challenges. Servers can be hard enough to maintain when they’re in an on-prem data center. What if they’re deployed in the middle of nowhere? Energy companies know all too well the challenges of remote computing. “When we drill a well, it’s always in the…

Read More

CIO Think Tank Roadmap Report: Reinventing IT

CIO Think Tank Roadmap Report: Reinventing IT

In March and April 2021, CIO held a series of CIO Think Tank discussions—virtual roundtables that brought together 36 IT leaders to unpack one of the most important issues in the enterprise today: IT reinvention. These discussions aimed to identify key issues in reinventing IT to meet today’s rapidly evolving business requirements, and offer a roadmap for IT leadership to overcome practical obstacles. The roundtables were facilitated by John Gallant, Enterprise Consulting Director for IDG,…

Read More
1 3,565 3,566 3,567 3,568 3,569 4,061