Everyone needs a safe space. A place where they feel they can be their true selves, with no masks or limitations. What's yours? Where's the place you go to for a sigh of relief -one filled with calm and freedom? For many, this pl...
Hello|fellow|readers! My name is Silvia. I am a Software Developer and a CIIP (Cisco International Internship Program) intern within Cisco IT! I am part of a team driving the SDx (Software Defined Everything) transformation in Cis...
What do you do when you're a part of a tiny support team but you're responsible for a large, extremely mission critical wireless network? You look to Cisco to make sure that your job is a bit easier. Houston Methodist Hospital is...
I recently spent a week in India meeting with partners and customers in Bangalore, Delhi and Mumbai. Every time I am in India, I am amazed by the pace of change since my last visit. The country is rapidly transforming into one of ...
The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious activity we see is done for financial gain, and cryptocurre...
Overview Discovered by Aleksandar Nikolic of Cisco Talos. Talos is disclosing a pair of vulnerabilities in Foxit PDF Reader.Foxit PDF Readeris a popular free program for viewing, creating, and editing PDF documents. It is commonly...
Roanoke County is home to five high schools, full of students who are ready to learn. But the county couldn't always bring kids classes that fit their strengths. Each school was a bit different, with its own subjects and electives...
Continuing|the|PnP story... The first blog in this series gave an overview of network PlugandPlay (PnP) and how it has evolved in DNA Center. It showed a very simple workflow to provision a device with a configura...
For most businesses, the rapidly changing nature of the modern data center poses a significant security challenge. The data center remains the heart of digital enterprises, and IT departments are looking for solutions to make the ...
These vulnerabilities were discovered by Tyler Bohan of Cisco Talos Today, Talos is disclosing several vulnerabilities that have been identified in Canvas Draw graphics editing tool for Macs. Canvas Draw 4 is a graphics editing to...
The first step should be an investigation and analysis of what your sensitive data is, where it lives, and who accesses it. Then analyze the three Foundational Pillars (see below) to see where you are with the necessary people, pr...
Hyperconverged Infrastructure (HCI) is a popular topic so it's no surprise that the announcement of HyperFlex 3.5 to kick off Cisco Live created a lot of buzz throughout the show. The release brings many exciting enhancements to t...