January 21, 2021
Via: Cisco2020 was an unusual year where circumstances shifted at record pace. Amidst the scramble and confusion, security teams rose to the occasion. Perhaps most significantly, organizations had to rapidly protect and scale their remote access while facing new security risks. […]
January 20, 2021
Via: Network ComputingWorking from home is not new. This writer has been using a home office since 2006. However, before the COVID-19 pandemic, remote work had been more of a perk than a way of doing business. Now millions upon millions of […]
January 18, 2021
Via: CSOAn enterprise security strategy should be like a weather report: subject to frequent updates. Allowing a security plan to fall out of sync with current and emerging threats, as well as evolving enterprise technologies and interests, can open the door […]
Hardware, Monitoring&Analysis, Security
January 15, 2021
Via: RCR Wireless NewsWith mere days left in office, President Donald Trump and his administration have added nine Chinese companies, including smartphone maker Xiaomi, to a list of firms suspected to be owned or controlled by China’s military. When placed on the list, […]
January 11, 2021
Via: Network ComputingNetwork visibility has been a buzzword for a few years now and has attracted its share of enthusiasts over that time. Skim through the industry press from 2020, and you’ll come away with the impression that network visibility is a […]
January 7, 2021
Via: CSOCybersecurity is first and foremost a business challenge. Many companies began recognizing this as digital transformation initiatives accelerated last year due to the pandemic, expanding the attack surface and associated cyber risks. For businesses uncertain about how to create a […]
Monitoring&Analysis, Security, Software
December 21, 2020
Via: Cisco BlogWelcome to the third and final installment in our series looking at the past, present and future of Secure Network Analytics (formerly Stealthwatch). Today, we get to talk about the future. In parts one and two of this series, we […]
December 18, 2020
Via: CSOCyberattacks are targeting endpoints – and it’s a growing trend. Ponemon recently surveyed 671 IT and IT security professionals from global companies. Sixty-eight percent of respondents said the frequency of attacks has increased over the past 12 months. More than […]
December 16, 2020
Via: CSOThe cloud is a smart way to store data and use virtual services. But some businesses, especially in industrial manufacturing, find it doesn’t meet their needs. And that’s where ‘fog computing’ has come to the fore. What is fog computing? […]
December 16, 2020
Via: Cisco BlogCounterfeiting hardware and software is an illegal and lucrative trade which leads to an estimated $100B loss of revenue annually across IT industries. As one of the largest and most reputable brands in the world, Cisco is often a target […]