From Service to Security: My Path to Empowerment at Cisco

From Service to Security: My Path to Empowerment at Cisco

My career journey began before I was even old enough to realize it. Growing up, my mother, a single parent and immigrant, turned her handcrafted items into our family’s livelihood at local flea markets, where I would often accompany her. Her resilience and entrepreneurial skills were my earliest lessons in business, laying the groundwork for my own aspirations. These early experiences instilled in me a drive to make a meaningful impact, a drive that has…

Read More

Resilience in Focus: How Boards Are Preparing for CPS 230

Resilience in Focus: How Boards Are Preparing for CPS 230

According to an industry expert, resilience has become a board-level concern for Australia’s financial services industry ahead of new CPS 230 Operational Risk Management regulations from the Australian Prudential Regulatory Authority, the industry’s regulatory body. Australian banks, insurers, and superannuation funds will be required to meet the APRA’s new consolidated CPS 230 standard for operational risk management. Those classified as “significant” financial institutions have until July 2025 to comply, while non-significant financial institutions have been…

Read More

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into clicking on malicious links in the first weeks of this holiday shopping season. As holiday excitement peaks and shoppers hunt for the perfect gifts and amazing deals, scammers are taking advantage of the buzz. The National Retail Federation projects holiday spending will reach between $979.5 and $989 billion this year, and cybercriminals are capitalizing by…

Read More

ANZ CIO Challenges: AI, Cybersecurity & Data Analytics for 2025

ANZ CIO Challenges: AI, Cybersecurity & Data Analytics for 2025

CIOs across Australia and New Zealand’s public sector face a “hard 12 months” managing their technology estates amid cost constraints, according to a leading regional Gartner analyst. However, there is optimism that investments in AI will deliver the productivity gains many anticipate. Gartner recently released the public sector findings from its CIO Technology Executive Survey. The firm found that 94% of ANZ government CIOs named data analytics as their top technology investment for 2025, followed…

Read More

1.1 Million UK NHS Employee Records Exposed

1.1 Million UK NHS Employee Records Exposed

Over a million NHS employee records — including email addresses, phone numbers, and home addresses — were exposed online due to a misconfiguration of the low-code website builder Microsoft Power Pages. In September, researchers with the software-as-a-service security platform AppOmni identified a large shared business service provider for the NHS that was allowing unauthorised access to sensitive data through insecure permission settings on Power Pages. Specifically, the permissions on some tables and columns in Power…

Read More

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

For the third consecutive quarter, Gartner has found that cyber attacks staged using artificial intelligence are the biggest risk for enterprises. The consulting firm surveyed 286 senior risk and assurance executives from July through September, and 80% cited AI-enhanced malicious attacks as the top threat they were concerned about. This isn’t surprising, as evidence suggests AI-assisted attacks are on the rise. Other commonly cited emerging risks outlined in the report include AI-assisted misinformation, escalating political…

Read More

Network Hacking Course Pairs with Cisco Modeling Labs

Network Hacking Course Pairs with Cisco Modeling Labs

If you’ve ever been to Cisco Live and seen the booth with a display for you to pick locks, then you know about the Cisco Advanced Security Initiatives Group (ASIG). We are chartered with security testing and ethical hacking for all Cisco products and services, whether in the cloud or on-premises. Anything Cisco sells, we have a go at it and try to break it—finding vulnerabilities as early as possible—before it’s deployed on the internet…

Read More

Products Of The Year 2024: The Finalists

Products Of The Year 2024: The Finalists

CRN staff compiled the top partner-friendly products that launched or were significantly updated over the last year. Now it’s up to solution providers to choose the winners. Application Performance and Observability As more applications run in hybrid-cloud and multi-cloud environments, maintaining application performance has becoming a more complex task. Application performance management and observability tools help IT organizations maintain the health, performance and user experience of business applications, according to market researcher Gartner. Such tools…

Read More

Best AI Security Tools: Top Solutions, Features & Comparisons

Best AI Security Tools: Top Solutions, Features & Comparisons

Generative AI features in enterprise software can be double-edged swords. AI introduces complexities and its own security issues. At the same time, it can speed up processes and enable new capabilities. The tools we’ve chosen here were often highly rated platforms before generative AI entered the scene, and we’ve rated them in part on longevity and positive reviews over time. Where AI features are major selling points for the products, we’ve examined them based on…

Read More

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities that were disclosed in 2023. The findings, published on Google Cloud’s blog, reveals that vendors are increasingly being targeted by attackers, who are continually reducing the average time to exploit both zero-day and N-day vulnerabilities. However, not all vulnerabilities are of equal value to attackers, as their significance depends on…

Read More
1 3 4 5 6 7 27