Get 5G SD-WAN with Cisco Catalyst Cellular Gateways – Cisco Blogs

Get 5G SD-WAN with Cisco Catalyst Cellular Gateways – Cisco Blogs

Service Providers and enterprises can now include Multi-Gigabit 5G wireless as an SD-WAN transport with Cisco’s new Catalyst Cellular Gateways. Go beyond Gigabit connectivity with mGig cellular edge routing that is fully manageable in Cisco SD-WAN vManage. Easily connect your gateway via Power over Ethernet (PoE). You can also bolster your SASE solution with Multi-Gigabit 5G for faster and more flexible cloud security. What Makes 5G for Cisco SD-WAN Unique In order to take advantage…

Read More

Resilience: The Key to Future-Proofing Your Security Program 

Resilience: The Key to Future-Proofing Your Security Program 

Following the last year, one word we can all identify with is resilience. Despite different backgrounds, locations, perspectives and roles, one common thing that unites us all is the need to adapt and respond to change.     Resilience was the key theme from this year’s RSA conference, which kicked off with an inspirational message from Cisco’s CEO Charles (Chuck) Robbins.   When the pandemic shut down many companies across the globe, Cisco was tasked with deploying the technology that connected the world in…

Read More

On the Importance of Protecting U.S. Pipeline Owners and Operators

On the Importance of Protecting U.S. Pipeline Owners and Operators

In the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company decided to respond by halting operations while it investigated the incident. This delayed tens of millions of gallons of fuel from reaching their destination all along the East Coast. Less than a week later, Bloomberg reported that the company had paid millions of dollars to a ransomware group in order to regain access to their systems. U.S. government officials were…

Read More

UK Banks Drive £77 Million Reduction in European Fraud Losses

UK Banks Drive £77 Million Reduction in European Fraud Losses

UK banks led the way in Europe last year with fraud protection efforts, driving an overall drop in associated losses of £77 million (€90 million) year-on-year, according to new data from FICO. The predictive analytics firm claimed that British financial institutions cut fraud losses by an impressive £46 million (€69 million) in 2020, the equivalent of a 7% reduction on 2019 figures. They were joined by their counterparts in Denmark, who managed to drive down…

Read More

Nearly 10% of SMB Defense Contractors Show Evidence of Compromise

Nearly 10% of SMB Defense Contractors Show Evidence of Compromise

More than half of SMB contractors in the US defense supply chain are critically vulnerable to ransomware attacks, a new report has claimed. Cybersecurity vendor BlueVoyant chose to analyze a representative sample of 300 smaller contractors from a defense industrial base (DIB) estimated to have anywhere from 100,000-300,000 suppliers. The resulting Defense Industry Supply Chain & Security 2021 review uncovered concerning signs of weaknesses in this complex ecosystem of contractors — potentially putting national security at…

Read More

Over 700 Councils Reported Data Breaches in 2020

Over 700 Councils Reported Data Breaches in 2020

Hundreds of councils across the UK suffered data breaches last year, according to new Freedom of Information (FOI) research from Redscan. The managed security services provider used official FOI responses from over 60% of the country’s 398 local authorities to compile its new report, Disjointed and under-resourced: Cyber security across UK councils. Extrapolating these results, Redscan estimated that there were over 700 breaches reported to data protection regulator the Information Commissioner’s Office (ICO) last year. The average number…

Read More

IT Governance Blog: writing an ISO 27001 risk assessment procedure

IT Governance Blog: writing an ISO 27001 risk assessment procedure

As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document your information security risk assessment process. Key elements of the ISO 27001 risk assessment procedure Clause 6.1.2 of the Standard states that organisations must “define and apply” a risk assessment process. An information security risk assessment is a formal, top management-driven process and sits at the core of an…

Read More

5 minutes with Nick Heywood – Security considerations for the hybrid workplace

5 minutes with Nick Heywood – Security considerations for the hybrid workplace

5 minutes with Nick Heywood – Security considerations for the hybrid workplace | 2021-06-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

From books to biometrics: Jeff Bezos’ lasting footprint on security

From books to biometrics: Jeff Bezos’ lasting footprint on security

From books to biometrics: Jeff Bezos’ lasting footprint on security | 2021-06-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Do the Benefits of Bitcoin Outweigh the Risks?

Do the Benefits of Bitcoin Outweigh the Risks?

What do Burger King and the popular “Doge” meme have in common? They both have cryptocurrencies named after their likeliness. WhopperCoin and Dogecoin are just two examples of the thousands of types of cryptocurrencies that have caught users’ attention over the past few years. Cryptocurrencies are digital tokens generated by a computer after solving complex mathematical functions. These functions are used to verify the authenticity of a ledger, or blockchain.   Bitcoin is the most popular cryptocurrency today, increasing its…

Read More
1 3,741 3,742 3,743 3,744 3,745 4,294