How Cisco addresses critical human needs and crisis response – Cisco Blogs

How Cisco addresses critical human needs and crisis response – Cisco Blogs

The following is an excerpt from the 2020 CSR Impact Report. As long as humanitarian crises disproportionately affect the most vulnerable members of society, there cannot be an Inclusive Future for all. Similarly, the promise of a digital economy—where connectivity unleashes new possibilities for creativity and innovation—cannot be realized until people’s basic needs for food, clean water, and adequate shelter are met. That’s why Cisco supports organizations that help the most vulnerable among us. We are…

Read More

Why what you watch can make you a target for cybercriminals

Why what you watch can make you a target for cybercriminals

Resist the lure of catching up with award nominees by trolling for free views. Free, when offered by bad actors, could end up costing you much more than it would for a one-time rental. Din Djarin and The Child, “The Mandalorian” Image: Disney Plus Free, more often than not, comes with strings. When it comes to movies and TV shows, treat “free” with a good deal of skepticism, according to new research from Kaspersky.  SEE: Top…

Read More

Why Your Innovation Engine May Be Hiding in Plain Sight – VMware Cloud Community

Why Your Innovation Engine May Be Hiding in Plain Sight – VMware Cloud Community

Data centers. In our fast-changing world of new, modern apps delivering even newer, more modern products and services, it can be easy to lose sight of this ‘chassis’ that underpins all of the hot innovations. App modernization has delivered capabilities like mobile apps and AI-driven service queues, bringing to our markets the power to deposit a personal check from our mobile devices or to manage a complex supply chain in just a few clicks. But…

Read More

How to manage the security challenges triggered by remote work

How to manage the security challenges triggered by remote work

Remote employees have engaged in certain risky behaviors, such as storing sensitive data, using inappropriate admin access and failing to update software, says Tanium. Image: iStock/simpson33 The coronavirus pandemic forced organizations to quickly and unexpectedly shift employees to a remote working environment. Though many IT teams have handled the transition as effectively as possible, such an abrupt change has still opened the door for increased security risks. A report released Monday by security provider Tanium…

Read More

Half of Orgs Concerned Remote Working Puts Them at Greater Risk of Cyber-Attacks

Half of Orgs Concerned Remote Working Puts Them at Greater Risk of Cyber-Attacks

Half of organizations are concerned that the shift to remote work is putting them a greater risk of cyber-attacks, according to a new study by LogMeIn in collaboration with IDG. A survey of UK CIOs, CTOs and IT decision makers revealed that insecure practices are regularly taking place among remote workers, providing more opportunities for cyber-criminals to strike. A large majority (80%) of organizations admitted that a portion of their workforce use personal computers to…

Read More

Cisco Completes Acquisition of Acacia – Cisco Blogs

Cisco Completes Acquisition of Acacia – Cisco Blogs

I’m excited to announce that Cisco has completed its acquisition of Acacia Communications, Inc., a company that designs and manufactures high-speed optical interconnect products and technologies. Acacia’s technology is very complementary to Cisco’s optical systems and optics strategy and reinforces its investment in the Internet for the Future with world-class coherent optical solutions for our customers. Acacia offers a complete portfolio of long-distance data transmission solutions that address the full range of applications in the…

Read More

Proofpoint Elects Elizabeth Rafael to its Board of Directors | Proofpoint US

Proofpoint Elects Elizabeth Rafael to its Board of Directors | Proofpoint US

Sunnyvale, Calif.— March 1, 2021 – Proofpoint, Inc., (NASDAQ: PFPT), a leading next-generation cybersecurity and compliance company, today announced its Board of Directors has elected Elizabeth (“Betsy”) Rafael as a new independent director, effective Thursday, February 25, 2021. Ms. Rafael has also been appointed as the chair of Proofpoint’s audit committee. Ms. Rafael is currently the Audit Chair at Autodesk and Kinaxis. She most recently served as Chief Transformation Officer at GoDaddy Inc. from May 2018…

Read More

Third-Party Software Security Scanning – Cisco Blogs

Third-Party Software Security Scanning – Cisco Blogs

This blog is co-authored by Nur Hayat and is part two of a four-part series about DevSecOps. Earlier in this series we covered how Continuous Security Buddy (CSB) for continuous integration/continuous delivery (CI/CD)—CSB for CI/CD —provides an automation framework for holistic, continuous security based on DevSecOps principles. In this blog, let’s take a closer look at software composition analysis, with a focus on security scanning of third-party software components in Cisco software. As the use…

Read More

Security magazine announces 2021 Top Cybersecurity Leaders recipients

Security magazine announces 2021 Top Cybersecurity Leaders recipients

Security magazine announces 2021 Top Cybersecurity Leaders recipients | 2021-03-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

IBM brings Red Hat to Power systems

IBM brings Red Hat to Power systems

IBM has introduced Red Hat Linux on its RISC-based Power systems, further expanding IBM’s private- and hybrid-cloud offerings on the traditionally Unix-based hardware. IBM already has what it calls Enterprise Linux on Power, but this is bringing Red Hat, which IBM paid $34 billion to acquire, to its big iron. IBM Power systems now feature Red Hat OpenShift on IBM Power Virtual Server leveraging OpenShift’s bare metal installer, Red Hat Runtimes, and newly certified Red Hat…

Read More
1 3,579 3,580 3,581 3,582 3,583 3,854