Networks today are supposed to be digital-ready, meaning fast and agile to propel business into a world where everything is connected. Getting there has hit some major speedbumps due to highly publicized hacks. And this has starte...
There's a line inAlice's Adventures in Wonderlandwhere Alice says "It's no use going back to yesterday, because I was a different person then." Some days I feel that way about my storage infrastructures as well. I fell down a part...
Discovered by Aleksandar Nikolic of Cisco Talos Overview Talos is disclosingTALOS-2016-0259/ CVE-2017-2791 an uninitialized memory vulnerability in Adobe Acrobat Reader DC. Adobe Acrobat Reader is one of the largest and well known...
Over the past several years, tech startups have emerged and disrupted all areas of the Financial Services industry. Wealth Management is no exception. A recent study by Roubini ThoughtLab in partnership with Cisco and 16 prestigio...
There's a lot of buzz around just now when it comes to supporting vendor-neutral data models at the device layer, so it's a good time to talk about what Cisco is doing to support open models, and OpenConfig models in particular. C...
One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there's any relevant company or industry news she needs...
Recent cyber attacks on organizations around the world have demonstrated the need for consistency in managing security vulnerabilities . To answer that demand, the Industry Consortium for the Advancement of Security on the Interne...
2017 is officially here and it's an exciting time to be in manufacturing. The industry is continuing to evolve as we see continued discussion around how to improve productivity, performance, and apply smarter analytics to improve ...
Converged Infrastructure featuring all-flash storage offers the promise of ease of use, faster performance, and better ROI. This is particularly true in the SAP world where the ability to rapidly access and process critical ...
This blog post was authored by Veronica Valeros and Lukas Machlica Malicious actors are constantly evolving their techniques in order to evade detection. It is not only the sophistication or the rapid pace of change that...
The Cisco Product Security Incident Response Team (PSIRT) is now scoring all security advisories addressing security vulnerabilities that affect Cisco products and multivendor vulnerability alerts using the Common Vulnerability Sc...
Who's your audience -millennials or unicorns? Of course, the answer is neither, because neither exist. It's pretty much impossible to define what a millennial is -try it, Google has plenty of results. It's become a shorthand term ...