article thumbnail

Cisco CEO: There's no enterprise perimeter to defend anymore

Network World

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021. Backup lessons from a cloud-storage disaster.

article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

With the CSO50 Conference + Awards coming to the We-Ko-Pa Casino Resort in Fort McDowell, Arizona, October 2-4, we asked Bill Tsoukatos, Information Technology Director at Fort McDowell Enterprises, which owns the resort, to tell us what it’s like to manage IT security at a casino property.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cisco CEO on security: "There is really no perimeter in the enterprise to defend anymore.”

Network World

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021. Backup lessons from a cloud-storage disaster.

Security 103
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO Business Intelligence

Modern advancements like artificial intelligence (AI) machine learning and blockchain-based networks specifically have an impact in this area. These attacks employ malicious software that encrypts files, rendering them inaccessible until a ransom is paid or a backup is restored.

Security 117
article thumbnail

FWA in the spotlight as “rising star" of 5G

TM Forum

Fei Liu, 5G and Mobile Network Infrastructure Industry Analyst at ABI Research, said that “a FWA user can consume 40x more network resources than a mobile user … In the long term, 5G FWA depends on sufficient network capacity and spectrum and the optimization of network resources”, she said.

Mobile 130
article thumbnail

Ransom-what? Learning from Hacked Hackers

SecureWorld News

They're getting into the network, they're installing malware, maybe additional malware, as well. They're looking to install root kits, escalate privileges, they're deleting backups (which corrupts and affects backups)." Again, the webcast is available on-demand now.

Backup 83
article thumbnail

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps

SecureWorld News

Network Segmentation: Segment the network to ensure that if one part of the organization is compromised, it doesn't automatically grant the attacker access to PII or other sensitive areas. Regular Backups: Regularly backup PII and other essential data. Only 2% of exposures lie on choke points leading to critical assets.

Mobile 86