More than words: A discussion with Shari Slate, VP of Cisco’s Inclusive Future & Strategy – Cisco Blogs

More than words: A discussion with Shari Slate, VP of Cisco’s Inclusive Future & Strategy – Cisco Blogs

The following is an excerpt from the 2020 CSR Impact Report. Q: How has Cisco taken a stand for social justice over the past year? A: In September 2020, we publicly unveiled Cisco’s Social Justice Beliefs and Our Commitment to Action. For all of us who poured our souls into creating this moment, it’s a remarkable milestone. Because it’s not just a platform for change. It’s a bridge. Connecting longstanding challenges with new possibilities for overcoming…

Read More

Product Innovation in Ultra Low Latency Applications – Cisco Blogs

Product Innovation in Ultra Low Latency Applications – Cisco Blogs

A switch with multiple personalities. That’s the concept behind Cisco’s new Nexus 3550-T Field Programmable Gate Array (FPGA) switch platform. This groundbreaking platform is the first FPGA switch with Layer 3 capabilities that can also run multiple applications ─ personalities ─ by leveraging the Cisco Firmware Development Kit (FDK). It’s also the first new Cisco switch based on the Exablaze FPGA technology from the Exablaze acquisition in February 2020. Layer 3 Switching Speedster The first…

Read More

After 15 years, Cisco Wireless AireOS Controllers are going away – Cisco Blogs

After 15 years, Cisco Wireless AireOS Controllers are going away – Cisco Blogs

Remember 2005? What were you doing then? Were you waiting a line for Microsoft’s recently released Xbox 360? Were you cheering for Tim Duncan and the San Antonio Spurs as they closed out the Detroit Pistons for the NBA Championship? German Chancellor Angela Merkel assumed office as the first female Chancellor of Germany. Do you remember witnessing that? It was a pretty busy year, but if you were in the tech world back then, I’m…

Read More

Facial Recognition Ethical Framework Launched by BSIA

Facial Recognition Ethical Framework Launched by BSIA

The British Security Industry Association’s (BSIA) video surveillance section has launched an ethical and legal use guide for Automated Facial Recognition (AFR). The guide, recommended by the Organization for Economic Co-operation and Development, outlines the considerations organizations should make regarding the responsible use of facial recognition technology, encompassing useful terms, abbreviations and ethical issues. The framework, designed to be accessible to both industry experts and the public, has a specific focus on the distinctive application…

Read More

Security chaos engineering helps you find weak links in your cyber defenses before attackers do

Security chaos engineering helps you find weak links in your cyber defenses before attackers do

Security experts explain why this approach is all about data and resilience, not deliberately sabotaging your own network. At a virtual summit on cybersecurity, Jamie Dicken, manager of applied security at Cardinal Health, said that security chaos engineering is similar to software testing. Image: Jamie Dicken Chaos engineering is a way for security teams to replace continuous firefighting with continuous learning, according to two industry experts. At the RSA 365 Virtual Summit this week, Aaron…

Read More

Researchers Spot SonicWall Exploit in the Wild

Researchers Spot SonicWall Exploit in the Wild

Security researchers believe that they’ve observed attacks in the wild exploiting a recently discovered SonicWall vulnerability. The technical Twitter account for global information assurance firm NCC Group posted yesterday referencing the original SonicWall advisory. “We’ve identified and demonstrated exploitability of a possible candidate for the vulnerability described and sent details to SonicWall – we’ve also seen indication of indiscriminate use of an exploit in the wild – check logs,” it urged. Followers of the account probed for…

Read More

Study finds Google has the fastest overall cloud platform

Study finds Google has the fastest overall cloud platform

Google Cloud Platform (GCP) is the best hyperscale performer across all areas of throughput while Microsoft Azure has the best storage systems and Amazon Web Services (AWS) has the lowest network latency. Those are the findings of a series of benchmarks performed by the atrociously named Cockroach Labs, maker of a scalable, resilient database called CockroachDB that runs on all three services. The study, part of the company’s third annual Cloud Report, evaluated the performance…

Read More

How-to improve Wi-Fi roaming

How-to improve Wi-Fi roaming

User satisfaction with Wi-Fi relies in part on whether the network supports smooth handoffs between access points as users and their devices roam about, and if the APs don’t do their job well, users will complain. The initial tendency may be to install more APs in hopes of finding an easy fix, but doing so without careful analysis can make the situation even worse. Proper roaming requires more than just good signal strength throughout coverage…

Read More

11 Respected Providers of IT Security Training – Tripwire

11 Respected Providers of IT Security Training – Tripwire

We at The State of Security are committed to helping aspiring information security professionals to reach their full potential. Towards that end, we compiled a two–part list of the top 10 highest paying jobs in the industry. Back in 2017, we even highlighted the U.S. cities that rewarded security personnel with the best salaries, amenities and other benefits. Knowing what job title you’d like and where you’d like to live goes a long way towards…

Read More

Trickbot Back from the Dead in New Campaign

Trickbot Back from the Dead in New Campaign

Security researchers are warning of a resurgence of prolific Trojan malware Trickbot, which had its infrastructure disrupted by a Microsoft-led coalition late last year. Menlo Security said it had observed a new malicious spam campaign designed to trick North American users in the legal and insurance sectors into downloading the Trojan. Whereas weaponized email attachments were a common feature of previous Trickbot campaigns, this one encourages users to click on a phishing link, which redirects…

Read More
1 3,636 3,637 3,638 3,639 3,640 3,840