Understanding the impact of the NIST NVD backlog on MSPs

Understanding the impact of the NIST NVD backlog on MSPs

Since February 2024, the National Institute of Standards and Technology’s (NIST) National Vulnerability Database (NVD) has encountered delays in processing vulnerabilities. This backlog, caused by factors such as software proliferation, budget cuts and changes in support, has significant implications for managed service providers (MSPs). Budget cuts and increased vulnerabilities NIST, an agency within the United States Commerce Department, saw its budget cut by nearly 12% this year. For over 20 years, the NVD has been…

Read More

Consolidation is coming to corporate security technology

Consolidation is coming to corporate security technology

Those old enough to remember the software industry in the 1980s might recall some names from days gone by: Lotus 1-2-3, Harvard Graphics, :ccMail and WordPerfect. At its peak, Lotus 1-2-3 had an overwhelming market share and had won the spreadsheet wars. WordPerfect was the enterprise standard for word processing and :ccMail was one of the dominant email systems of the decade. And Harvard Graphics? As the first presentation software to gain widespread acceptance in…

Read More

The power of partnerships

The power of partnerships

Throughout the day to day operations of a business or organization, it can be easy for different departments to work independently; however, when it comes to developing an effective security strategy, working cooperatively is indispensable. Whether it is collaborating with other departments or with outside organizations, building and maintaining partnerships is mission critical. “It’s impossible to do everything yourself,” says Jay Gruber, Associate Vice-President for Public Safety and Chief Public Safety Officer at Georgetown University….

Read More

Simplify Manufacturing Operations with Cloud Platforms

Simplify Manufacturing Operations with Cloud Platforms

Introduction In the ever-evolving landscape of modern manufacturing, operational simplicity stands as a cornerstone for success. Manufacturers grapple with an array of challenges, from complex supply chains to the pressing need for real-time insights. To address these challenges head-on, cloud platforms emerge as transformative solutions, streamlining processes, reducing costs, and fostering innovation. In this comprehensive exploration, we delve into the pivotal role of cloud-based network management platforms in helping to revolutionize manufacturing operations, empowering companies to…

Read More

Why 2024 is the Year of AI for Networking 

Why 2024 is the Year of AI for Networking 

“This is the year of AI,” declared Chuck Robbins recently at Mobile World Congress. With demand growing from a broad range of enterprise customers who plan to build out their own artificial intelligence (AI) infrastructure, the market is changing and expanding rapidly. Consider the key results of the Cisco AI Readiness Index, based on detailed surveys of more than 8,000 business and IT leaders around the world, which revealed that 84% of organizations surveyed expect…

Read More

Technology helps power security through staffing shortages and beyond

Technology helps power security through staffing shortages and beyond

Technology helps power security through staffing shortages and beyond | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Video management system monitors security & operations at tobacco firm

Video management system monitors security & operations at tobacco firm

Video management system monitors security & operations at tobacco firm | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Virtual security operations center protects gaming company assets

Virtual security operations center protects gaming company assets

Virtual security operations center protects gaming company assets | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More