Choppy Wi-Fi Waters: FCC Action Could Improve Cruise Ship Connectivity

Choppy Wi-Fi Waters: FCC Action Could Improve Cruise Ship Connectivity

Cruise vacations are more popular than ever, with nearly 20 million Americans expected to set sail this year—up 4.5% from 2024. This boom is not just a post-pandemic rebound; cruise demand is now outpacing growth in the traditional hotel sector. By 2030, U.S. cruise industry revenues are projected to more than double—rising from approximately $3.7 billion in 2024 to nearly $7.6 billion. As more Americans take to the seas, it’s time for the U.S. Federal…

Read More

How NetOps and SecOps Evolution to Solve Network Compliance is Driving Efficiency

How NetOps and SecOps Evolution to Solve Network Compliance is Driving Efficiency

Co-authored by Gavin Littleboy Challenges in Network Compliance Government agencies face significant challenges in maintaining network compliance due to the ever-increasing complexity of regulations. From NIST 800-53, cybersecurity vulnerabilities, to other security requirement guides like DISA Security Technical Implementation Guides (STIGs) for Department of Defense, comprehensive measures require configuring and maintaining networks to ensure they stay compliant and are secure against vulnerabilities and threats. Compounding this issue are the limited budgets and resources available within…

Read More

3 Ways the UK Government Plans to Tighten Cyber Security Rules with New Bill

3 Ways the UK Government Plans to Tighten Cyber Security Rules with New Bill

Amid a sharp spike in ransomware attacks disrupting essential services and critical infrastructure, the U.K. government has set out the scope of its upcoming Cyber Security and Resilience Bill for the first time. It aims to patch the holes in the country’s existing cyber regulations and protect critical infrastructure from ransomware and other attack types. “The Cyber Security and Resilience Bill, will help make the UK’s digital economy one of the most secure in the…

Read More

Unlocking the Power of Network Telemetry for the US Public Sector

Unlocking the Power of Network Telemetry for the US Public Sector

Co-authors: Lou Norman and Erich Stokes A golden nugget can be seen as a valuable piece of information that significantly enhances security measures. In cybersecurity, identifying and leveraging such golden nuggets can be crucial for maintaining robust security postures and preventing breaches. Unlocking the Power of Network Telemetry Network telemetry is a transformative tool for the US Public Sector, acting as a ‘Golden Nugget’ within Cisco network and other vendor hardware. It provides a wealth…

Read More

Unlocking the Future: How AI Networks Can Overcome U.S. Connectivity Challenges 

Unlocking the Future: How AI Networks Can Overcome U.S. Connectivity Challenges 

As artificial intelligence (AI) becomes an integral part of our daily lives, companies like Cisco are leading the charge in developing AI-driven solutions. Policymakers, meanwhile, are grappling with how to keep up, particularly as businesses integrate AI into their products and services. At Cisco, we see the benefits of AI-enabled networks every day – from helping our customers with proper equipment setup and detecting service disruptions to preventing and mitigating security intrusions. That’s why Cisco…

Read More

AI-Powered Networks Can Enable Europe's Digital Ambitions

AI-Powered Networks Can Enable Europe's Digital Ambitions

The European Union (EU) is at a pivotal moment in its digital journey. With several legislative proposals from the European Commission—namely the Digital Networks Act, the AI and Cloud Development Act, and the revision of the 2030 Digital Decade targets—the bloc is set to shape its AI and connectivity landscape for years to come. AI’s role in communications networks is central to this shift. To explore its impact, Cisco supported Analysys Mason to deliver a…

Read More

Apple Fights UK Over Encryption Backdoors as US Officials Warn of Privacy Violations

Apple Fights UK Over Encryption Backdoors as US Officials Warn of Privacy Violations

Image: garloon/Envato Images Senior officials from the U.K. have privately met with their U.S. counterparts to clarify that their request for access to encrypted data in Apple’s iCloud is not a blanket demand; instead, they are seeking access solely to data linked to individuals already involved in crimes such as terrorism, according to Bloomberg. People familiar with the matter told the publication that the British officials emphasized separate warrants would be required for each access…

Read More

DoJ Busts Alleged Global Hacking-for-Hire Network

DoJ Busts Alleged Global Hacking-for-Hire Network

Image: BirgitKorber, Getty Images/iStockphoto The Justice Department has charged 12 Chinese nationals for their alleged involvement in global hacker-for-hire activities. According to court documents, targets included the U.S. Treasury Department, journalists, and religious organisations. The attacks aimed to steal data and suppress free speech. The indictment names two officers of China’s Ministry of Public Security, eight employees of a private company known as both Anxun Information Technology and i-Soon, and two members of the hacking…

Read More

Apple Taking Legal Action Against UK Over Backdoor Demands

Apple Taking Legal Action Against UK Over Backdoor Demands

Image: TheClimateGroup/Creative Commons (2014) Apple is taking legal action against the U.K. government over demands to weaken its strongest cloud security measures, arguing that compliance would jeopardize user privacy and set a dangerous precedence. The Cupertino giant has taken the case to the Investigatory Powers Tribunal, the U.K.’s judicial body responsible for handling complaints regarding the use of surveillance powers by public authorities. It is challenging the legality of the Home Office’s order under the…

Read More

Cyber Attack Severity Rating System Established in U.K.

Cyber Attack Severity Rating System Established in U.K.

A new rating system in the U.K. will classify the severity of cyberattacks on a scale from one to five, aiming to provide businesses and policymakers with more precise insights into the impact of cyber threats. The Cyber Monitoring Centre, an independent nonprofit organisation of industry experts, will assess incidents in real time and publish results for free. The system is designed to be easily understood, similar to the Saffir-Simpson hurricane scale, which categorises hurricanes…

Read More
1 2 3 5