Illegal Streaming of Pay TV – Is It a Pirate Treasure Island?
Have pirates found their treasure island? With streaming piracy on the rise, we’ve taken a close look at the reasons - and numbers - behind this trend.
The Internet of Vulnerable Things
Technological progress is resulting in computing systems that are smaller, cheaper and consuming less power. These micro-computing systems are able to be integrated into everyday objects; when coupled with ubiquitous wireless connectivity these devices form the “Internet of Things”. The IoT has the potential to improve our lives, but only if we correctly manage the […]
May 25th #CiscoChat Recap: Securing Your Network in the Age of #Ransomware Attacks
Maybe your users mistakenly clicked on a suspicious ad. Or maybe they were tricked into opening an email link. But no matter how it happened, here you are: Ransomware has encrypted your files, and you need to pay a hefty fee to get them back. It’s not just you: The attacks continue to proliferate — now approaching a $1 billion annual market — as they infect the computers and networks of entire organizations...
Join us for “Real World Deployments for Industrial Applications” Webinar
There has been a lot of discussion lately around why IoT projects fail. Many projects stall at the proof of concept (POC) phase, and only about a quarter of these investments are considered a success. With these setbacks however, there are some notable achievements as well. As part of our factory of the future webinar […]
Cisco Accelerates Digital Transformation with Enterprise Agreement Launch
This is exciting. It has been just over a year since my first blog in which I stated, “To win in today’s market where disruptive startups and agile competitors are advancing on all sides, digitizing the enterprise to infuse greater agility and innovation is critical. This means transforming your operating model, which includes reimagining products […]
Cloud Unfiltered Podcast, Episode 09: Branson Matheson
He may or may not have hacked his mom’s cable box when he was a kid, he definitely worked for the Navy as a cryptologist, and he has since worked for NASA, the TSA, and Silent Circle. So Branson Matheson has a lot to say about information security and the desire for online privacy that […]
How to Secure Your Data Centre: The Importance of Whitelist Policies
Growing up in Britain, a fair share of our history lessons covered the black death. It was a truly horrible plague that affected all without prejudice, ravaging the young and old throughout towns, cities, countries and the continent with seemingly no end. Surprisingly, it’s hard to remember everything from that class (hey, it was quite […]
BWT Podcast EP5 – It Has Been 0-days Since This Term was Abused
Beers with Talos Episode 5 “It Has Been 0-days Since This Term was Abused” is now available. Beers with Talos offers a topical, fast-paced, and slightly irreverent take on cybersecurity issues. If you are an executive, a grizzled SOC vet, or a n00b, you will take something away from each episode. We won’t promise it’s anything […]