Data is growing at an astonishing rate. Trends like cloud, IoT and digitization are imposing higher demands on how data is managed, transported, backed up and restored. Increased business dependence on IT means downtime has more m...
LikeRenee Pattonwho isGearing up for EDUCAUSE 2016, I am equally thrilled to be co-presenting with BruceMaas and BobTurner from the University of Wisconsin -Madison. Our session, Effective Threat Detection: The Key to Constra...
Based on the cybersecurity news proliferating in the mainstream media today -from ransomware incidents to data breaches of massive proportions -it has become clear that organizations need to put security mechanisms in place to pro...
The nation of Iraq is frequently in the news, but up until now not because of its ultra-modern IP and optical network. This week we announced that Cisco is playing a key role to restore and rebuild the Iraqi National Backbone, a m...
"The only constant is change." It's an adage that goes back 2500 years to the Greek philosopher Heraclitus. But never has it been as true as it is today. Technology adoption is growing exponentially, driving change at a dizzying p...
Submitted by Kelsey Kusterer Ziser, the Editor of Upskill U at Light Reading As service providers migrate traditional networks to virtualized networks, it's no longer enough to only secure the perimeter. Threats from within the ne...
The digital transformation of Argentina has begun -and Cisco is at the forefront of the change. First though, it's important to note that, Latin America faces some daunting statistics: 21 million Latin Americans will be unemployed...
NOW is the time to align your marketing and sales efforts. More than ever you as partners, regardless of your function, have to remain vigilant of customers' needs in today's digital world. Everything moves faster. Everyone is con...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're discussing Cisco CloudCenter. Get the Podcast Listen to this episode Download this episode (right-click on the episode's download bu...
In April we covered the description of Email Spoofing using Microsoft Outlook, but what about detecting and mitigating it on the Mail Transfer Agent (MTA)? There are multiple technologies that have attempted to address the issues ...
On or Off the Clock, Staying Cyber Secure is a New Fact of Life Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of mind for home networks as well. Take a quick guess at how ...
Vulnerability Discovered by Tyler Bohan and Cory Duplantis of Cisco Talos Talos has identified an exploitable out-of-bounds write vulnerability in the ELF Section Header parsing functionality of Hopper (TALOS-2016-0222/C...