How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Getting ahead of the new normal: Counter-drone security

Getting ahead of the new normal: Counter-drone security

Today, commercially available drones are being used as weapons. Flying improvised explosive devices (IEDs) first emerged in the Iraq and Syrian conflicts around 2016. Terrorist organizations released videos of drones used for surveillance and reconnaissance as early as 2014. It did not take long for sophisticated criminals and drug cartels to mirror those tactics of foreign terrorist groups. One cartel has created a drone unit for this specific task. The developments in the Ukraine conflict…

Read More

Leveraging visitor management data for enterprise safety

Leveraging visitor management data for enterprise safety

Leveraging visitor management data for enterprise safety | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Have we declared “open season” on CISOs?

Have we declared “open season” on CISOs?

Have we declared “open season” on CISOs? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Top security conferences of 2023

Top security conferences of 2023

Top security conferences of 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

You’re a good leadership lesson, Charlie Brown

You’re a good leadership lesson, Charlie Brown

You’re a good leadership lesson, Charlie Brown | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The characteristics of a thought leader

The characteristics of a thought leader

The characteristics of a thought leader | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top security career challenges for 2023

Top security career challenges for 2023

Top security career challenges for 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3 19