VMware Reports Fiscal Year 2022 First Quarter Results

VMware Reports Fiscal Year 2022 First Quarter Results

News Detail Total Revenue growth of 9% year-over-year Subscription and SaaS revenue growth of 29% year-over-year PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW), a leading innovator in enterprise software, today announced financial results for the first quarter of fiscal year 2022: Revenue for the first quarter was $2.99 billion, an increase of 9% from the first quarter of fiscal 2021. The … Thu, 27 May 2021 00:00:00 Total Revenue growth of 9% year-over-year Subscription…

Read More

Feds Warn DarkSide May Not Stay Dark

Feds Warn DarkSide May Not Stay Dark

The cyber-criminal gang DarkSide, which allegedly disbanded after carrying out the Colonial Pipeline ransomware attack, may not stay dark for long, according to a report by CNBC. Key government cybersecurity and counterintelligence officials told the news source that if the gang has actually stopped operating, it could soon be back to its old and highly lucrative tricks under a different alias. Research published last week by London-based blockchain analytics firm Elliptic appears to show that DarkSide extorted…

Read More

Helping Partners Through Magnified IT Market Change – Cisco Blogs

Helping Partners Through Magnified IT Market Change – Cisco Blogs

Steve WhiteProgram Vice President, IDC Guest blogger: Steve White, Program Vice President, Channels & Alliances, IDC Steve White is Program Vice President for the WW Channels and Alliances research team. He manages a group of channels and alliances analysts as well as their related research products, with extended teams in EMEA & APeJ. The Channels and Alliances research team focuses on research around changing partner ecosystem dynamics, following the trends and best practices to allow benchmarking….

Read More

How to enable SSH 2FA on AlmaLinux for more secure logins

How to enable SSH 2FA on AlmaLinux for more secure logins

If you’ve started rolling out AlmaLinux to your data centers, you should enable 2FA for SSH authentication. Jack Wallen shows you how. Image: iStockphoto/Jirsak AlmaLinux is a drop-in replacement for CentOS that also happens to be a 1:1 binary replacement for Red Hat Enterprise Linux. Chances are pretty good you’ll be deploying this enterprise-ready Linux server distribution soon. When you do, you want to make sure it’s as secure as possible. One way to beef…

Read More

Homeland Security unveils new cybersecurity requirements for pipeline operators

Homeland Security unveils new cybersecurity requirements for pipeline operators

Owners and operators will have to identify any gaps in their security and report new incidents to key federal agencies because of the Colonial Pipeline ransomware attack. Image: Bloomberg/Getty Images In the wake of the ransomware attack against Colonial Pipeline, the Department of Homeland Security (DHS) has revealed new requirements aimed at all pipeline owners and operators in the U.S. Announced by DHS’ Transportation Security Administration (TSA) on Thursday, the security directives are designed to…

Read More

The five core components that will drive the next wave of banking innovation

The five core components that will drive the next wave of banking innovation

The growth in online banking has been – and will continue to be – rapid. From a valuation of $11.43 billion in 2019, the projections are that it will reach $31.81 billion by 2027, at a CAGR of 13.6%. For the incumbent banking system, this rapid growth poses a real and ongoing challenge, as it has opened the door to unconventional disruption and new competition. Non-banking companies are now able to bring different business models…

Read More

Scripps Health still grappling with impact of May 1 ransomware attack

Scripps Health still grappling with impact of May 1 ransomware attack

The hospital chain has been forced to reschedule operations and is working to bring its electronic health record systems back online. Getty Images/iStockphoto A May 1 ransomware attack against California hospital chain Scripps Health continues to impact both the organization and its patients almost a month later. On Monday, Scripps Health published an FAQ with new details about the attack as well as directions for affected patients. In its update, the organization acknowledged a cybersecurity…

Read More

Data Breach at Canada Post

Data Breach at Canada Post

Canada’s primary postal operator, Canada Post, confirmed Wednesday that it has suffered a data breach.  The security incident occurred following a cyber-attack on one of the Crown corporation’s suppliers, Commport Communications, which provides electronic data interchange solutions.  Commport Communications was hired by the postal service to manage the shipping manifest data of its large parcel business’ customers. Following the cyber-attack, Canada Post has informed 44 of its commercial customers that data belonging to more than 950,000 customers…

Read More

Applying DevNet Associate Skills to Real World Tasks – June webinars

Applying DevNet Associate Skills to Real World Tasks – June webinars

Nothing says summer fun like studying network automation. Am I right!?! Okay, maybe it’s not quite as much fun as amusement parks, beaches, mountain hiking, or camping, but that doesn’t mean you can’t also have fun studying for a DevNet Certification between those other activities.  And I’ll be hosting a series of FOUR webinars in June 2021 focusing on applying the skills of a DevNet Associate to real world tasks, use cases, and problems that…

Read More

Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find one overlooked weakness. Defenders, meanwhile, are often overwhelmed with alerts, unsure what to patch first and have little real visibility into the weaknesses of their ever-changing environments. In a battle between active adversaries who only need to land a single blow to win — and passive defenders…

Read More
1 3,568 3,569 3,570 3,571 3,572 4,061