Biztonsági szemle
2026. Feb. 5.
Biztonsági szemle
Partner Profitability Is Changing — Are You Building for Durability?
Stop building for the next transaction and start building for the next decade. Discover how the Cisco 360 Partner Program helps partners unlock a $6.06 revenue multiplier by mastering managed services, customer lifecycle practices, and recurring...
2026. Feb. 5.
Biztonsági szemle
Cisco Live Amsterdam: Join Us at ‘Leading the AI Revolution’
AI is no longer just a technology—it’s a new lever of national power, competitiveness, and strategic advantage. As governments and organizations grapple with the promise and complexity of AI, q… Read more on Cisco Blogs
2026. Feb. 5.
Biztonsági szemle
Developing a National Cybersecurity Strategy in the AI Era: A Playbook for Government
Just last year, Rwandan Minister of IT and Innovation Paula Ingabire called on countries to come together to confront cyber threats that are now unfolding at global scale. As she noted, emerging technologies—from AI and robotics to IoT and blockchain...
2026. Feb. 5.
Biztonsági szemle
Elevating Meraki Operations with Red Hat Ansible Automation Platform
In our previous blog, “Streamline Operations with Cisco Meraki and Red Hat Ansible Automation,” we introduced the powerful integration between Cisco Meraki’s cloud-managed networking and Red Hat… Read more on Cisco Blogs
2026. Feb. 5.
Biztonsági szemle
Cyber Success Trifecta: Education, Certifications & Experience
Colonel Georgeo Xavier Pulikkathara, CISO at iMerit discusses the importance of fundamentals, continuous learning, and human ingenuity in the face of AI-driven cybersecurity evolution.
2026. Feb. 5.
Biztonsági szemle
Facing the Quantum Threat: Cisco’s Strategic Approach to PQC
Quantum threats are closer than you think. Explore Cisco’s strategic approach to Post-Quantum Cryptography (PQC) and how to protect against HNDL risks now.
2026. Feb. 5.
Biztonsági szemle
How to use the perfdhcp DHCP testing tool
Introduction perfdhcp is a tool to generate DHCP client traffic. It can be used to benchmark DHCP server performance, or to reproduce specific scenarios for testing. It is capable of simulating most client interactions, but there are some small...
2026. Feb. 5.
Biztonsági szemle
Protests Don't Impede Iranian Spying on Expats, Syrians, Israelis
Iranian threat actors have been stealing credentials from people of interest across the Middle East, using spear-phishing and social engineering.
2026. Feb. 4.
Biztonsági szemle
Ransomware Gang Goes Full 'Godfather' With Cartel
Since its launch in 2023, DragonForce has pushed a cartel model, emphasizing cooperation and coordination among ransomware gangs.
2026. Feb. 4.
Biztonsági szemle
CISA Makes Unpublicized Ransomware Updates to KEV Catalog
A third of the "flipped" CVEs affected network edge devices, leading one researcher to conclude, "Ransomware operators are building playbooks around your perimeter."
2026. Feb. 4.
Biztonsági szemle
Attackers Use Windows Screensavers to Drop Malware, RMM Tools
By tapping the unusual .scr file type, attackers leverage "executables that don't always receive executable-level controls," one researcher noted.
2026. Feb. 4.
Biztonsági szemle
The Domains and Organizational Functions of AI Security
When your CISO mentions “AI security” in the next board meeting, what exactly do they mean? Are they talking about protecting your AI systems from attacks? Using AI to catch hackers? Preventing employees from leaking data to an unapproved AI service...
Oldalszámozás
- Előző oldal ‹‹
- 19. oldal
- Következő oldal ››