How to Write a Great Talk Proposal for DockerCon LIVE 2021 – Docker Blog

How to Write a Great Talk Proposal for DockerCon LIVE 2021 – Docker Blog

First off, a big thank you to all those who have already submitted a talk proposal for DockerCon LIVE 2021. We’re seeing some really excellent proposals and we look forward to reviewing many more! We opened the CFP on February 8th and with a few more weeks to go before we close the CFP on March 15th there’s still lots of time to submit a talk.  If you’re toying with the idea of submitting a…

Read More

Anomali February Product Release: Moving Beyond Tactical Intelligence

Anomali February Product Release: Moving Beyond Tactical Intelligence

We are happy to announce the Anomali Product Release for February 2021. For our product and engineering teams to deliver this latest set of features and enhancements, they worked closely with our customers with a particular eye to supporting security teams in their further move beyond a reliance on tactical, technical intelligence to a holistic, threat-model-driven approach by allowing them to work with threat models like the MITRE ATT&CK framework inside Anomali ThreatStream easily and…

Read More

WSJ Executive Forum: Advancing security in the new business environment

WSJ Executive Forum: Advancing security in the new business environment

WSJ Executive Forum: Advancing security in the new business environment | 2021-03-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Quarter of Healthcare Apps Contain High Severity Bugs

Quarter of Healthcare Apps Contain High Severity Bugs

A quarter (25%) of healthcare apps contain high severity flaws, but healthcare organizations (HCOs) are relatively quick to fix them, according to new data from Veracode. The security vendor broke out sector-specific data collected for its State of Software Security report and claimed that three-quarters (75%) of healthcare applications contained some kind of vulnerability. This is about on par with the cross-sector average, which stands at 76%. The sector fixes 70% of the flaws it…

Read More

Canadian Bacon – Zero to Hero when it comes to Zero-Trust – Cisco Blogs

Canadian Bacon – Zero to Hero when it comes to Zero-Trust – Cisco Blogs

Zero trust means a lot of different things to a lot of different people, but I think we all can agree that the zero trust is NOT a single product or platform but a collection of capabilities. The premise of zero trust and its framework can provide a more consistent security approach that reduces risk and increases security posture and overall effectiveness. Never trust and always verify! So, what does Zero trust mean to me,…

Read More

Network Orchestration is a Key to Success in Meeting Application Synergies for Combined On-Prem and Edge Workloads

Network Orchestration is a Key to Success in Meeting Application Synergies for Combined On-Prem and Edge Workloads

By: Simon McCormack, Senior Manager of Product Management at Aruba, a Hewlett Packard Enterprise company By the end of next year, the majority of enterprise network infrastructure teams will have completely changed their operating models to support applications, people, and IoT devices in entirely new ways. Network orchestration is a key technology that can help achieve success for tying everything together as the rapid shift to a “centers-of-data” model accelerates. Don’t be left on the…

Read More

How to protect your brand from rogue actors

How to protect your brand from rogue actors

Many people were cheering for the Kansas City Chiefs during Super Bowl LV. Not because they were Chiefs fans, and not because they didn’t like the Tampa Bay Buccaneers. They wanted KC to win because they wanted, more than anything else, for Tom Brady to lose. Probably more than any other modern-day athlete, people despise Tom Brady (a quick Google search will show you just how much). In the days leading up to the Super…

Read More

Our Everyday Superheroes: Women Leaders at Cisco  – Cisco Blogs

Our Everyday Superheroes: Women Leaders at Cisco  – Cisco Blogs

In 2014, when I joined Cisco as a Post Sales and Partner Analyst, I had no idea what Cisco would come to mean to me – or how much this company would change my life. From the amazing benefits and meeting my spouse (a blog in itself!) to the ability to work remotely and give back to the community – there are so many “Cisco Moments” in my life that truly stand out. Yet, one…

Read More

We’re Raising the Bar on Inclusive, Effective Collaboration with Webex Solutions for Every User

We’re Raising the Bar on Inclusive, Effective Collaboration with Webex Solutions for Every User

The Webex for Inclusive Collaboration series focuses on delivering capabilities for the future of work with inclusive, effective collaboration tools Solutions for Every User with Webex This month marks the one-year anniversary of when our definition of “work” changed more dramatically than ever before – and likely forever. The past 12 months have taught us a number of valuable lessons. For example, I’ve learned that Webex noise removal technology comes in handy when my 10-year-old…

Read More

Universal Health Services Estimates $67 Million in Ransomware Losses

Universal Health Services Estimates  Million in Ransomware Losses

A ransomware attack on Universal Health Services (UHS) last autumn cost the company an estimated $67 million in downtime and related expenses, it has revealed. The Fortune 500 healthcare organization has tens of thousands of employees in the US and UK and annual revenues exceeding $10 billion. However, it fell victim to a Ryuk attack at the end of September 2020 which forced the firm to pull the plug on key systems in the US….

Read More
1 3,577 3,578 3,579 3,580 3,581 3,854