Securing the business network has been and continues to be one of the top initiatives for engineers. Suffering a breach can have catastrophic consequences to a business, including lawsuits, fines, and brand damage from which some companies never recover. To combat this, security professionals have deployed a number of security tools, including next-generation firewalls (NGFW) […]
Power a Multicloud World – Enabling Next-Generation Hybrid Cloud with Google Cloud
The pressure to innovate has never been greater to compete in a rapidly evolving marketplace. Hybrid cloud offers one of the biggest IT transformations of our generation. More RSS Feed: newsroom.cisco.com/rss-feeds …
Supermicro is the latest hardware vendor with a security issue
Security researchers with Eclypsium, a firm created by two former Intel executives that specializes in rooting out vulnerabilities in server firmware, have uncovered vulnerabilities affecting the firmware of Supermicro servers. Fortunately, it’s not easily exploited. The good news is these vulnerabilities can be exploited only via malicious software already running on a system. So, the […]
How Erasure Coding Is Evolving
Erasure coding, an alternative to RAID, and is changing to address emerging data resiliency challenges. Data resiliency is at a crossroads. Traditional SAN storage solutions than run on Redundant Array of Independent Disks (RAID) are creaking under the strain of new data demands. While striping, mirroring, and parity in RAID implementations provide various degrees of […]
SAP reveals C/4 HANA, its bid to reinvent CRM
Analysis 6 Jun, 2018 Joe Curtis ERP giant still can't convince major industries to buy its front-office tools over Salesforce's kit
People@Cisco: Roger Dickinson
Cloud and cartoons. A Technical Solutions Architect shares his journey of evolution at Cisco. More RSS Feed: newsroom.cisco.com/rss-feeds …
Microsoft drops a clean energy datacentre into the North Sea
News 6 Jun, 2018 Bobby Hellard Redmond hopes the underwater cloud storage facility could mean faster data transfers
What happens if IoT security doesn’t get solved?
Sometimes, confirmation of the obvious can be really important. At least, that’s how I felt when I saw a new Bain & Company report, Cybersecurity Is the Key to Unlocking Demand in IoT. According to the consulting firm’s survey, 45 percent of Internet of Things (IoT) buyers say “concerns about security remain a significant barrier […]
Learn what the ‘zero trust’ security model really means | Salted Hash Ep 29
Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.
SDNs and NFV are complementary and core components of modernized networks
The terms software defined networking (SDN) and network functions virtualization (NFV) are often used interchangeably, which is incorrect. In a sense, the two are tied together as companies start using NFV as part of their SDN plans but that doesn’t have to be the case. Enterprises could maintain their current network architecture and shift to […]