newsCisco patches actively exploited zero-day flaw in Nexus switchesThe moderate-severity vulnerability has been observed being exploited in the wild by Chinese APT Velvet Ant.By Lucian ConstantinJul 02, 20241 minNetwork SwitchesNetwork Security news OpenSSH vulnerability regreSSHion puts millions of servers at riskBy Lucian ConstantinJul 01, 20241 minNetwork Securitynews Top network and data center events 2024By Denise DubieJun 26, 20244 minsNetwork SecurityCloud ComputingData Center newsTata Communications partners with Versa Networks on hosted SASEBy Lynn Greiner Jun 25, 20241 minSASENetwork Security newsHow AWS secures its infrastructure with SonarisBy Shweta Sharma Jun 20, 20245 minsAmazon Web ServicesCloud StorageNetwork Security brandpostSponsored by ZscalerFrom the trenches: A CISO's guide to threat intelligenceBy Ben Corll, CISO in Residence Jun 13, 20245 minsNetwork Security brandpostSponsored by ZscalerDon’t break the bank: Stopping ransomware from getting the best of your businessBy Jay Chaudhry, CEO, Chairman and Founder, Zscaler Jun 13, 20246 minsNetwork Security brandpostSponsored by ZscalerNYC Department of Education builds the pipeline for future cybersecurity professionalsBy Demond Waters & Anthony Dixon Jun 13, 202410 minsNetwork Security analysisRansomware, zero-day exploits keep network security pros scramblingBy Michael Cooney Jun 12, 20244 minsRemote Access SecurityNetwork Security ArticlesnewsCato Networks launches managed SASE partner platformSASE provider Cato Networks introduces a new program to help MSPs more quickly deliver security services to customers.By Denise Dubie Jun 24, 2024 3 minsSASESD-WANNetwork SecuritynewsNetskope secures SaaS apps with genAIEnhancements to Netskope’s cloud access security broker (CASB) module aim to secure the use of genAI and SaaS applications.By Denise Dubie Jun 11, 2024 4 minsSASEGenerative AICloud Access Security BrokernewsCisco Live: AI takes center stageCisco CEO Chuck Robbins says the AI evolution is coming on fast, like the cloud transition on steroids.By Michael Cooney Jun 05, 2024 9 minsGenerative AINetwork SecurityNetworkingnewsCisco shows off new AI features to secure data flowsThe networking giant is busy embedding AI capabilities across the Cisco Security Cloud and beyond. By John E. Dunn Jun 04, 2024 4 minsGenerative AINetwork SecurityNetworkingfeatureCisco gears up to capitalize on Splunk deal, AI revolutionDespite recent rough patch, Cisco has growth opportunities on multiple fronts.By Neal Weinberg May 30, 2024 13 minsNetwork Management SoftwareNetwork SecurityNetworkingfeatureHow to deploy WPA3 for enhanced wireless securitySix key tips for upgrading to the latest version of the Wi-Fi Protected Access standard.By Eric Geier May 28, 2024 7 minsWireless SecurityWi-FiNetwork SecuritynewsCisco research highlights network complexity, security challengesCisco’s 2024 Global Networking Trends Report finds IT leaders are besieged by rising cybersecurity risks, workload types, and distributed infrastructures.By Michael Cooney May 22, 2024 6 minsNetwork SecurityCloud ComputingNetworkingbrandpostSponsored by ZscalerPhishing attacks rise 58% in the year of AIAI has blurred the line between authentic and fraudulent content, making it more challenging to discern phishing schemes from legitimate web pages and digital communication.By Zscaler May 20, 2024 7 minsMachine LearningNetwork SecuritybrandpostSponsored by ZscalerNew VPN risk report finds nearly half of enterprises attacked via VPN vulnerabilities As the number of high-profile security vulnerabilities associated with VPNs continues to rise, businesses should anticipate a corresponding rise in security incidents related to VPNs.By Zscaler May 20, 2024 6 minsNetwork Securityhow-toDownload our hybrid cloud data protection enterprise buyer’s guideFrom the editors of Network World, this enterprise buyer’s guide helps network and security IT staff understand the issues their organizations face around protecting corporate data in a hybrid cloud environment and how to choose the right solution.By Neal Weinberg May 20, 2024 1 minHybrid CloudNetwork SecurityEnterprise Buyer’s GuidesanalysisNetwork teams are ready to switch tool vendorsIT orgs feel less locked into their network management tools, particularly as they look to apply AI/ML to tasks such as intelligent alerting, change management, and capacity management.By Shamus McGillicuddy May 20, 2024 4 minsNetwork Management SoftwareNetwork SecurityanalysisBGP: What is border gateway protocol, and how does it work?BGP is how the autonomous networks that make up the internet share routing information to find the best route for IP traffic. CISA describes BGP as 'the most important part of the internet you’ve probably never heard of.'By Keith Shaw May 17, 2024 11 minsRoutersInternetNetwork Security Show more Show less View all Upcoming Events05/Aug-07/Aug in-person event CIO 100 Symposium & AwardsAug 05, 2024The Broadmoor, Colorado Springs, CO Events 24/Sep in-person event FutureIT TorontoSep 24, 2024Vantage Venues, Toronto Events 26/Sep virtual event FutureIT CanadaSep 26, 2024Virtual Event Events View all events Resources whitepaper Secure AI Development: The Double-Edged Sword that Cuts Both Ways AI is a powerful tool that can quickly generate software code. But AI can also introduce vulnerabilities, especially when developers take shortcuts. The post Secure AI Development: The Double-Edged Sword that Cuts Both Ways appeared first on Whitepaper Repository –. By Security Innovation 03 Jul 2024Artificial IntelligenceData and Information SecuritySecurity whitepaper Download the IT Modernization July 2024 Enterprise Spotlight By Foundry Editorial 03 Jul 2024Business OperationsDigital TransformationIT Leadership whitepaper How OpenTelemetry Builds a Robust Observability Practice By Splunk 02 Jul 2024Business OperationsData ManagementVendor Management View all Video on demand videoWhat is zero trust security?Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of “trust no one”. We explain the concept in this video. Aug 30, 2023 3 minsInternet SecurityRemote Access SecurityNetwork Security See all videos Explore a topic 5G Careers Cloud Computing CPUs and Processors Data Center Edge Computing Enterprise Storage Generative AI Industry Internet of Things Linux Networking Network Management Software Virtualization All topics Close 5G Careers Cloud Computing CPUs and Processors Data Center Edge Computing Enterprise Storage Generative AI Industry Internet of Things Linux Networking Network Management Software Virtualization Show me morePopularArticlesPodcastsVideos news Nokia to buy optical networker Infinera for $2.3 billion By Evan Schuman Jul 02, 20244 mins Mergers and AcquisitionsNetworking news French antitrust charges threaten Nvidia amid AI chip market surge By Prasanth Aby Thomas Jul 02, 20243 mins Technology IndustryGPUsCloud Computing news Lenovo adds new AI solutions, expands Neptune cooling range to enable heat reuse By Lynn Greiner Jul 02, 20244 mins Cooling SystemsGenerative AIData Center podcast Has the hype around ‘Internet of Things’ paid off? | Ep. 145 Apr 18, 202436 mins IoT PlatformsIoT Security podcast Episode 1: Understanding Cisco’s Converged SDN Transport Sep 24, 202120 mins Cisco SystemsInternetNetworking podcast Episode 2: Pluggable Optics and the Internet for the Future Sep 23, 202117 mins Optical DrivesCisco SystemsInternet video How to use the stat command Jun 27, 20242 mins Linux video The SL command easter egg Jun 27, 20241 mins Linux video How to use the shuf command Jun 27, 20241 mins Linux