NEWS
Meet the Prairie Dogs: Preventing Future Attacks

All seems peaceful in the burrow, but watch how the prairie dogs respond after an attack and fortify their defenses. Check out our series of videos to see how the prairie dogs use Cisco's simple, open, and automated approach to security to effectively fend off predators from every angle.

Watch Online
NEWS
CenturyLink Business: It is Time to Calculate the Cost of Digital Security

Dale Partridge, founder of Startupcamp.com, explains the importance of digital organization and the risks associated with disorderly data. Regardless if your business is small or mid-sized, it's only as strong as the technology that protects it.

Watch Online
NEWS
Brocade Network Packet Broker for Mobile Service Provider Networks

Link mentioned in the video:http://www.brocade.com/en/products-services/network-visibility-analytics.html

Watch Online
NEWS
Decide. Commit. Succeed. How Beachbody Moved to a Next-Generation Architecture

Beachbody vaulted over 17 years of legacy system and practices to a community leadership position in our technology culture, embracing a Platform-as-a-Service (PaaS) and Microservice architecture driven world. In this session, learn how Beachbody, a B2C/B2B multi-level marketing company modernized and set the groundwork for its next generation of products and services using the power of open source, and DevOps and service enablement from CA Technologies.

Watch Online
NEWS
Albertslund Looks to Cisco for Help With the Future

The Municipality of Albertslund looks to Cisco for help in city, culture, environment and employment.

Watch Online
NEWS
From threats to protection technologies

Building security technologies that allow us to detect sophisticated targeted attacks is a much more complicated task then creating another extension for an anti-virus. It is not just about a new malware on a given PC or mobile device. It is about looking at the cyber landscape on a much larger scale. It involves analyzing not just the separate files but the whole data flow. Distinguishing thousands of patterns, detecting the usual ones and those that shouldn't be there.

Watch Online

News

This article draws on insights from Eliott Hoole, Project Business Manager, and Matt Ansell, Product Portfolio Manager at LAPP Limited, exploring the rapid growth of data centres and the critical role of cable...
CloudCasa strengthens its data protection solution with new features for Red Hat OpenShift users, enhancing flexibility, storage efficiency, and recovery capabilities.
The new global Code of Professional Conduct sets ethical standards for cybersecurity practitioners worldwide, emphasising trust, integrity, and principled decision-making.
Scality and WEKA have partnered to integrate their storage technologies, aiming to provide enterprises with a scalable AI storage solution designed to improve performance and reduce infrastructure complexity.

Expert Opinions

By Dan Petrillo, VP of Product at BlueVoyant.
By Lorri Janssen-Anessi, Director of External Cybersecurity Assessments, BlueVoyant
IoT-Enabled Components and the Next Phase of Data Center Infrastructure. By George Connelly, Strategic Business Analyst at Wesgarde.
By Arik Diamant, Principal Solution Architect, at Claroty.