Splunk + Cisco ThousandEyes: New Integration for End-to-End Digital Resilience

Splunk + Cisco ThousandEyes: New Integration for End-to-End Digital Resilience

Cisco unifies observability and assurance to provide clarity and resilience across the digital footprint, helping to resolve issues faster. To unlock the full potential of AI and automation, teams can’t afford to waste time stitching together siloed insights. That’s why we’re bringing Splunk Observability and Cisco ThousandEyes Assurance closer together with new bidirectional integrations that connect the dots across your digital stack – from application to infrastructure to network. While many customers already use both…

Read More

BayLISA and Cisco DevNet – Tech meetups in person and online

BayLISA and Cisco DevNet – Tech meetups in person and online

What happens when the sysadmin community meets a modern developer movement? BayLISA and DevNet, that’s what😎! What is BayLISA? BayLISA stands for Bay Area Large Installation System Administrators and is a user group of system and network administrators from the San Francisco Bay Area. The user group was founded in the very early 1990s after the fourth Large Installation System Administration (LISA) conference. BayLISA meets monthly to discuss topics of interest to administrators and managers…

Read More

Proofpoint unveils unified platforms to combat data & cyber risks

Proofpoint unveils unified platforms to combat data & cyber risks

Proofpoint has introduced two new cybersecurity solutions aimed at unifying threat protection and data security across multiple digital channels and organisational environments. The first of these offerings, Proofpoint Prime Threat Protection, is described by the company as a unified, human-centric threat protection platform delivering multichannel, multistage defence across email, cloud applications, and collaboration tools. The second solution, a Unified Data Security Solution, brings together data loss protection, data security posture management, and insider threat management…

Read More

88% of security teams are reaching or exceeding performance goals

88% of security teams are reaching or exceeding performance goals

A survey from Tines reveals that 88% of security teams are reaching or exceeding performance goals. This is despite limited staff and greater workloads, as 60% of security teams contain less than 10 people and 72% of workers report increased workloads from the previous year. Furthermore, 72% of security leaders can perform their role without working extended hours, and 83% report having a healthy work-life balance. This survey consulted more than 900 security decision makers…

Read More

Rate limit Management and Troubleshooting with the new Meraki “API Analytics Dashboard”

Rate limit Management and Troubleshooting with the new Meraki “API Analytics Dashboard”

Ever hit an API rate limit unexpectedly? Or struggled to track which integrations are consuming the most API calls? We know that feeling—API troubleshooting can be frustrating when there’s little visibility into what’s happening behind the scenes. Without clear insights, it’s easy to run into performance issues, unexpected failures, and rate limit hits that slow down automation and network management. That’s why we are excited to introduce the Meraki API Analytics Dashboard—a new API visualization…

Read More

3 Takeaways from NRF 2025: Retail's Big Show

3 Takeaways from NRF 2025: Retail's Big Show

It’s been a few weeks since Cisco joined more than 40,000 retail industry leaders in New York City for NRF: Retail’s Big Show.  This event is consistently the pulse of the evolving retail landscape and serves as a central hub for what’s next in the industry. The 2025 event featured the theme “Game Changer,” and throughout the event experience, three game–changing takeaways stood out above the rest:  AI is driving new capabilities in personalized engagement…

Read More

Automation alone isn’t enough to patch vulnerabilities — Here’s why

Automation alone isn’t enough to patch vulnerabilities — Here’s why

While the future is hard to predict, we can count on two things about the cybersecurity landscape in 2025. First: cyberattacks are growing in volume as bad actors continue to diversify their methodologies. Second: the cost of exploits is increasing.  Impacts of cyberattacks are expanding beyond financial losses, impacting the daily operations of critical services including healthcare and travel. Organizations need to consider how they approach patching as vulnerabilities increase in volume and complexity and…

Read More

Automation gains traction as CISOs grapple with compliance challenges

Automation gains traction as CISOs grapple with compliance challenges

According to the State of Continuous Controls Monitoring (CCM) Report, over half of CISOs (51.6%) still struggle to meet their governance, risk, and compliance (GRC) goals. As security leaders navigate increasingly complex technology environments, compliance with new and existing regulations remains a significant challenge. The report reveals a critical insight: while most CISOs see automation as a key opportunity to reduce manual processes, few are leveraging AI-powered tools in their compliance programs. This gap highlights…

Read More

Building the Future of Connectivity: Boost Mobile and Cisco's Collaborative Journey

Building the Future of Connectivity: Boost Mobile and Cisco's Collaborative Journey

In an era where connectivity is paramount, Boost Mobile has emerged as a formidable player in the telecommunications landscape. As part of Dish Network, Boost Mobile provides robust and reliable wireless services to over 240 million customers. We had the opportunity to sit down with Mike (Mac) McNamara, Vice President and Head of Network Engineering for Boost Mobile, to discuss the challenges, solutions, and outcomes of the company’s ambitious 5G network deployment and the pivotal…

Read More

It's time to embrace OSCAL automation for effective risk management

It's time to embrace OSCAL automation for effective risk management

The National Institute of Standards and Technology (NIST) put forward the Open Security Controls Assessment Language (OSCAL) standard in 2021, creating a standardized machine readable language. The goal of the standard is to enable automation and facilitate interoperability between different security assessment tools. It also aims to enable real-time machine to machine data exchange, improving automation and interoperability across various compliance frameworks. There are a multitude of regulatory standards and frameworks that organizations must adhere…

Read More
1 2 3 4