A Commander’s-Intent-driven Network – Enabling Cyberspace Operations from the Tactical Edge and Beyond

A Commander’s-Intent-driven Network – Enabling Cyberspace Operations from the Tactical Edge and Beyond

As the U.S. Army makes the network its top priority to enable operations, AFCEA TechNet Augusta 2024 offers a unique platform to delve into how people, processes, and technology shape cyberspace operations in the Cyber Domain. I am thrilled to contribute to this vital discussion and invite you to join me in the Engagement Theater during our Solutions Review Session on Thursday, August 22, 2024, at 0900. I will be presenting alongside Cisco Learning Partner,…

Read More

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

A vulnerability in the ESXi hypervisor was patched by VMware last week, but Microsoft has revealed that it has already been exploited by ransomware groups to gain administrative permissions. VMware ESXi is a bare-metal hypervisor that enables the creation and management of virtual machines directly on server hardware, which may include critical servers. CVE-2024-37085 is an authentication bypass vulnerability that allows malicious actors with sufficient permissions to gain full access to a domain-joined ESXi host….

Read More

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware Attacks Are Attracting Record Payouts in Australia. Should You Pay the Ransom?

Ransomware remains one of the most common forms of cyber attack — and it’s particularly threatening because it can be incredibly effective. Globally, ransomware damage costs are predicted to exceed $265 billion by 2031. These attacks can affect even the largest of organisations. In July, a hacking group disrupted more than 230 of Indonesia’s government agencies and services by infecting critical systems at a national data centre. Why organisations are tempted to pay ransoms Theoretically,…

Read More

8 Daily Practices to Avoid Cybersecurity Burnout

8 Daily Practices to Avoid Cybersecurity Burnout

Burnout happens when job demands such as workload, time pressure, and difficult clients are high, as well as when job resources, including quality leadership, autonomy and decision authority, recognition, and strong relationships, are lacking. The field of cybersecurity is particularly difficult, but that doesn’t mean burnout is inevitable, and it doesn’t mean you can’t recover after experiencing burnout. There are some daily practices that you can take to help you avoid burnout while keeping your performance…

Read More

ManageEngine: Australian SMEs Aim to Reduce IT Costs Amid Growing Technology Complexity

ManageEngine: Australian SMEs Aim to Reduce IT Costs Amid Growing Technology Complexity

IT costs are the biggest challenge facing tech leaders in Australian medium-sized enterprises, according to a survey commissioned by IT management software vendor ManageEngine. This challenge is expected to intensify as these enterprises adopt more applications and grow their AI spending. The Digital Intensity in Australia Study, conducted by research house Ecosystm for ManageEngine 24×7, found that many medium-sized enterprises, ranging from 200 to 1,500 employees, are still in the early stages of transforming into…

Read More

How a smart connected container shows how to find yourself in the future of shipping

How a smart connected container shows how to find yourself in the future of shipping

This blog comes from Niels Van den Berg, one of Cisco’s Digital Business Development Leaders who evangelizes Cisco’s digitization vision, strategy, and supporting technologies to bring this all to life in national critical infrastructures. Niels presents on “Find yourself in the future of shipping” in our August 1 webinar. Here’s a taste… If you’re reading this blog there’s approximately a 90 percent chance[i] you’re reading it on a device that has been in a shipping…

Read More

Cisco Decipher: Enhancing US Public Sector Cybersecurity Knowledge

Cisco Decipher: Enhancing US Public Sector Cybersecurity Knowledge

Cybersecurity has become a foundational pillar for every government institution. And the US Public Sector, which handles sensitive data and encompasses a mass of critical infrastructure, has become a prime target for cyber threats. So, it’s imperative that public sector organizations stay ahead of the curve in cybersecurity practices. Enter Cisco Decipher, a knowledge hub that takes a practical approach to covering information security, providing clear and insightful cybersecurity information. Today I’ll discuss exactly what…

Read More

Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy

Sharing Isn’t Always Caring: 3 Tips to Help Protect Your Online Privacy

When it comes to protecting your privacy, take a close look at your social media use—because sharing can quickly turn into oversharing. The term “oversharing” carries several different definitions. Yet in our case here, oversharing means saying more than one should to more people than they should. Consider the audience you have across your social media profiles. Perhaps you have dozens, if not hundreds of friends and followers. All with various degrees of closeness and…

Read More

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos: Top Ransomware TTPs Exposed

Cisco Talos analyzed the top 14 ransomware groups between 2023 and 2024 to expose their attack chain and highlight interesting Tactics,Techniques and Protocols. The security company also exposed the most leveraged vulnerabilities being triggered by ransomware actors. Ransomware attack chain: What Cisco Talos researchers learned Ransomware actors nearly all use the same attack chain. Typical ransomware attack chain. Image: Cisco Talos Step one for ransomware actors The first step for the threat actor consists of…

Read More

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

The online forum OpenAI employees use for confidential internal communications was breached last year, anonymous sources have told The New York Times. Hackers lifted details about the design of the company’s AI technologies from forum posts, but they did not infiltrate the systems where OpenAI actually houses and builds its AI. OpenAI executives announced the incident to the whole company during an all-hands meeting in April 2023, and also informed the board of directors. It…

Read More
1 8 9 10 11 12 27