It's an old trope in horror movies: "The call is coming from inside the house!" For healthcare professionals, there's a similar tale that's almost as scary - and unfortunately, real. A recent analysis found that healthcare is the ...
It may seem harsh to say you need to break out of your cocoon, but it is meant as a compliment!! Metamorphosis is often used as an analogy for change, and the cocoon stage is the stage oftransformationfrom a caterpillar to b...
In IT, the "next big thing" happens a lot. With technology moving so fast and shifting so quickly, sometimes it's unclear where to best invest your time, effort, and dollars. In the cloud corner of IT, one of the next big things h...
Aligning to today's digital climate means that we must change the way we approach our customers. We are thinking differently about how we address their needs. According to Garner, worldwide IT spending is forecasted to reach$3.7 t...
Discovered by Aleksandar Nikolic of Cisco Talos Overview Today, Talos is releasing details of a new vulnerabilities within Adobe Acrobat Reader DC. Adobe Acrobat Reader is the most popular and most feature-rich PDF reader. It has ...
Discovered by Marcin Noga of Cisco Talos Overview Cisco Talos has identified six vulnerabilities in the Antenna House Office Server Document Converter (OSDC). These vulnerabilities can be used to remotely execute code on a vulnera...
As organizations navigate the rapid and constant change of digital transformation, they look for vendors who can deliver and partners they can trust to guide them on the journey. Transparency is undoubtedly one of the most critica...
Recently, I became a millionaire! Well,technicallyI'm a millionaire, even though my bank account may reflect otherwise. During a recent conference where I was talking about blockchain technology, I created a blockchain based crypt...
As security practitioners, we have the seemingly impossible task of defending an ever-changing environment. It seems like every time we get close to compliance, new vulnerabilities and threat vectors are discovered. So, we continu...
Energy and specifically electrically powered devices and appliances are part of everyday life for all of us. However, the dependency on personal computing devices like phones, tablets, headsets and the likes has made us realize ho...
As marketers, we've come a long way in becoming data-driven experts when it comes to creating more engaging personalized marketing experiences. GDPR is making us think more critically about how we leverage data, maintain customers...
June is one of my favorite months of the year because the beginning of summer is also the time for our largest conference of the year -Cisco Live! This year, Cisco's annual conference of innovation was on full display in sunny Orl...