Top 5 Cyber Security Trends for 2025

Top 5 Cyber Security Trends for 2025

The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold increase in ransomware attempts this year, while research predicts that global cyber attacks in 2024 will surge 105% compared to 2020. There is a dire need for more qualified cyber professionals as generative AI is lowering the barrier to entry for attacks. Unfortunately, cyber skills gaps have been reported in both the U.K. and Australia, with women making up only a quarter…

Read More

The Customer Adoption Journey of Cisco Secure Workload

The Customer Adoption Journey of Cisco Secure Workload

In today’s rapidly evolving threat landscape, securing workloads across diverse environments is critical for organizations of all sizes. Cisco Secure Workload (formerly Tetration) provides end-to-end visibility, microsegmentation and advanced security capabilities for workloads deployed across data centers and cloud environments. This blog post explores the customer adoption journey of Cisco Secure Workload, highlighting key stages and best practices for successful implementation. Road to microsegmentation Awareness: Identifying the need The adoption journey typically begins with the…

Read More

Cisco Secure Workload: Leading in Segmentation Maturity

Cisco Secure Workload: Leading in Segmentation Maturity

As cyber threats evolve, defending workloads in today’s multi-cloud environments requires more than traditional security. Attackers are no longer simply at the perimeter; they may already be inside, waiting to exploit vulnerabilities. This reality demands a shift from just keeping threats out to minimizing their impact when they breach. Cisco Secure Workload is at the forefront of this shift, offering solutions to help organizations reach segmentation maturity.  What is segmentation maturity?  Segmentation maturity is about…

Read More

Understanding and applying the zero trust mentality

Understanding and applying the zero trust mentality

In this episode of The Security Podcasts featuring Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, we discuss the basics of a zero trust mentality as well as how it can be effectively implemented in the workplace. “Zero trust is a ‘never trust, always verify’ platform where we’re constantly looking at user and device activity on the network for indicators of compromise. The benefits it would have to an organization would…

Read More

Business Leader’s Guide for a Successful Microsegmentation Project

Business Leader’s Guide for a Successful Microsegmentation Project

Not too long ago, during an executive briefing, I was asked a thought-provoking question by the CISO of a large airline in the US. He asked, “Brijesh, microsegmentation solutions have existed for a decade. Based on your experience, can you tell me why so many microsegmentation projects fail, and why it is so difficult to achieve microsegmentation across hybrid IT environments?” His question resonated deeply with me because it highlights a challenge many organizations face….

Read More

IPConsul automates operations with Cisco’s industrial IoT secure networking

IPConsul automates operations with Cisco’s industrial IoT secure networking

Sweet Success: How Industrial IoT Transforms Maple Syrup Farming in the Harshest Environments  When you think of a harsh industrial environment, nibbling squirrels might not immediately come to mind. For maple syrup farmers however, critters munching on tubing, bears gnawing on spouts, and equipment damaged by severe weather are just part of the routine. A remote 1000-maple tree farm in Quebec was therefore the ideal testing ground for IT service provider, IPConsul, to demonstrate how…

Read More

Redrawing the line of perimeter protection

Redrawing the line of perimeter protection

The concept of creating a barrier or ring around an environment for safeguarding can be traced back to ancient civilizations, where they had to protect themselves from marauding armies or spies infiltrating their settlements. Today, organizations are facing ever-evolving threats from outside and within their boundaries from terrorism, state-sponsored cyber-attacks, industrial espionage, politically driven activism — the list goes on. What’s more, the tools at the disposal of bad actors are more powerful than ever,…

Read More

The critical need for cyber-resilient roadways

The critical need for cyber-resilient roadways

As intelligent transportation systems (ITS) undergo rapid digital transformation, the benefits are clear: smoother traffic flow, enhanced road safety, and significant strides toward achieving climate goals. Yet, amidst these advancements, a critical challenge remains at the forefront – ensuring the security of this increasingly connected infrastructure. With the increasing number of connected systems, the attack surface grows, raising concerns about the vulnerability of critical infrastructure. The World Economic Forum has emphasized this risk, noting that…

Read More

Zero trust: A business imperative for the digital age

Zero trust: A business imperative for the digital age

In today’s digital world, enterprises face unprecedented cyber threats from sophisticated actors who exploit the vulnerabilities of a complex and dynamic IT environment. As organizations adopt cloud computing, artificial intelligence and other emerging technologies to enhance their business capabilities and competitiveness, they also expose themselves to new attack vectors and risks.  According to a report by IBM, the global average cost of a data breach in 2024 — a 10% increase over last year and…

Read More

Maximizing business benefits with robust hybrid cloud security

Maximizing business benefits with robust hybrid cloud security

Byline: Chris Jenkins, Principal Chief Architect at Red Hat  The evolution of containers and hybrid cloud technologies has brought significant benefits to the enterprise. These platforms democratize access to new applications and technologies, enabling teams to work more seamlessly together and facilitate increased innovation within the organization. Over the last few years, IT leaders have been championing migrations from on-premises based virtual machines to containers and the hybrid cloud accordingly, with almost three quarters (73%)…

Read More
1 2 3 13