Regardless of the industry, vertical, or market segment they compete in, your customers' network architectures are becoming more distributed and complex. Where networks were once largely built around isolated data centers, th...
May 01, 2018 Dell Technologies Powers Up the Modern Data Center and Future of Work ...
Last year we tried something new. It was inspired by a number of folks I've known over the years who tried to find aquiet space at Cisco Live to record a podcast. Oddly, it's not that quiet at a conference that hosts 2...
The|ushering|in of the app era has resulted in an increased focus on User Experience (UX) in practically every product, including those, like (say) networking products, that were traditionally considered as too technical to be sim...
Cisco at RSA Conference 2018 At the RSA Conference (RSAC) 2018 last week, more attendees and exhibitors than ever before hit the streets of San Francisco.The annual gathering of security luminaries, leaders and practitioners attra...
It's easy to get excited (and maybe a little nervous) about artificial intelligence (AI). In the simplest sense, AI is an advanced capability of machines to learn from what it experiences and make inferences from data -similar to ...
On April 4, we published a blog on the Cisco ACI Virtual Edge-a next generation of the Cisco AVS for ACI networks. But this was only part of our promise for next generation solutions at the virtual network edge. For almost ten yea...
This blog post is authored by Warren Mercer and Paul Rascagneres. Summary Today, Cisco Talos is uncovering a new piece of malware, which has remained under the radar for the past two years while it continues to be d...
Many people think of cybercriminals as technical masterminds using advanced coding skills to hack into the backend of faceless devices or datacenters -devices that those with careers outside of IT have little to no interactio...
Faster, smarter, and simpler.It's what technology users want, according to Gartner, CIO Magazine, and technology pundits. And we want those things in all areas of our lives, in and outside of tech. All technology vendors are striv...
Vulnerabilities discovered by Marcin 'Icewall' Noga from Talos Overview Talos has discovered multiple vulnerabilities in Hyland Perceptive Document Filters software. This software is a toolkit that allows developers to read and ex...
From the time we're young, we're taught not to waste water. We cut down on our showers and turn off the faucet when we brush our teeth. But, we're not always on the lookout for other ways we waste water-like leaks. These can be ha...