Secure Cloud Analytics brings Cloud Posture to its new event viewer!

Secure Cloud Analytics brings Cloud Posture to its new event viewer!

At our Partner Summit 2020 virtual event, we announced some exciting new features that focus on Cloud Security Posture Management (CSPM) that would soon be available for Secure Cloud Analytics customers. A growing number of cloud resources and accounts to manage can mean more headaches for your SecOps team and leads to an expanded threat surface. What’s more, is that these public cloud resources typically span across numerous providers which can make visibility challenging. Maintaining…

Read More

Greek Police to Introduce Live Facial Recognition

Greek Police to Introduce Live Facial Recognition

Police in Greece are to be issued new devices that will allow them to carry out real-time facial recognition and fingerprint identification while out on the beat.  The plan to disseminate the new technology is part of the 4.5 million euro “Smart Policing” project announced in 2017 that aims to identify and verify the identity of citizens when stopped by the police. Most of the project costs (75%) are being covered by the Internal Security Fund (ISF)…

Read More

Michigan Computer Science Professor Charged with Sex Crime

Michigan Computer Science Professor Charged with Sex Crime

A professor of computer science and engineering at the University of Michigan has been charged with first degree sexual misconduct. Peter Chen was arraigned on January 27 and given a personal recognizance bond. The 55-year-old professor has taught at the university for 27 years. Dean of the College of Engineering, Alec Gallimore, announced to students and faculty that Chen had been placed on paid administrative leave on Thursday. Ann Arbor police launched an investigation into the professor…

Read More

Changing Customer Experience with the All New Webex Contact Center [WEBINAR]

Changing Customer Experience with the All New Webex Contact Center [WEBINAR]

Join renowned contact center industry analyst Sheila McGee-Smith and Cisco Contact Center VP/GM Omar Tawakol for a live stream on February 3, 2021, as they discuss five essential elements for the contact center platform of the future, and how Webex Contact Center delivers these. A Transporter By Any Other Name . . . Many people think that the concept of the transporter was created by the writers on Star Trek, however an episode of the…

Read More

Understanding Container Images, Part 2: Optimizing Your Images

Understanding Container Images, Part 2: Optimizing Your Images

In the first post of this series we discussed how container images are built. We talked about layers, reusing them, and how to make your Dockerfiles build faster. We also started to build a container containing our shiny ‘Hello World’ C application. Hello world app – Take 2 What is the ultimate goal of our container? In this case, we want to be able to build our application in an automated and consistent way, and…

Read More

Rapid7 Expands Cloud Security Portfolio with Acquisition of Alcide

Rapid7 Expands Cloud Security Portfolio with Acquisition of Alcide

Rapid7 has announced the acquisition of Kubernetes security provider Alcide.IO as part of efforts to enhance its cloud native security platform. The deal is worth approximately $50m, subject to certain adjustments. The announcement has come amid growing use of Kubernetes by developers in order to quickly develop containerized applications as part of the overall shift to the cloud. Israel-based Alcide’s technology helps ensure Kubernetes security is fully embedded into the DevOps lifecycle to enable cloud…

Read More

China Steals Personal Data of 80% of US Adults

China Steals Personal Data of 80% of US Adults

The Chinese government may have stolen personal data from 80% of adults in the United States, according to a 60 Minutes report that aired yesterday on American television and radio network CBS.  In the report, former director of the US National Counterintelligence and Security Center, Bill Evanina, warned that the PRC is actively working to gather and exploit Americans’ DNA and other health information. Evanina described how Chinese company BGI Group had approached six different states with…

Read More

Cisco Podcast Team Kicks-Off a Five-Part Financial Services Series – Cisco Blogs

Cisco Podcast Team Kicks-Off a Five-Part Financial Services Series – Cisco Blogs

In the ever-changing financial services industry, we realize the importance of timely, relevant industry updates. Especially after a year as transformative as 2020, so often, by the time an article is released, the industry has already pivoted its gaze elsewhere. Recognizing that, Cisco launched its own industry podcast show, Coffee and Conversations. Co-hosted by Cisco Consumers Industry Global Marketing Executive, Danny Vicente, and Cisco Global Industry Marketing Manager/Executive Coach, Garry Senna, Coffee and Conversations has…

Read More

Cybersecurity pros should switch from Indicators of Compromise to Indicators of Behavior

Cybersecurity pros should switch from Indicators of Compromise to Indicators of Behavior

Security experts suggest using IOBs to move from reacting to a cyberattack to preventing the incident. Image: Getty Images/iStockPhoto Most cybersecurity professionals have been trained to use Indicators of Compromise (IOC) when reacting to a cyberattack, and they are not happy about the after-the-fact nature of this approach. The switch to a work-from-home model is another significant limitation cybersecurity pros are battling. It removes the well-defined perimeter that they were used to. SEE: How to…

Read More

The who, what, why and how of the Baker Hughes GITSOC

The who, what, why and how of the Baker Hughes GITSOC

The who, what, why and how of the Baker Hughes GITSOC | 2021-02-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More
1 3,635 3,636 3,637 3,638 3,639 3,840