- United's bug bounty doesn't include in-flight systems
- The week in security: It's hack or be hacked as airplane rises, defences fall
- FBI: Victims of online fraud lost $800m to scammers last year
- Attackers use email spam to infect point-of-sale terminals with new malware
- Large scale attack hijacks routers through users' browsers
cisco - News, Features, and Slideshows
cisco in pictures
Cisco reportedly skirted US sanctions in order to sell networking equipment to Russia's military.
Reports surfaced last week that Cisco may be close to buying hyperconvergence start-up Nutanix.
US House votes to end NSA dragnet...Wal-Mart set to compete with Amazon Prime...Chambers gets sentimental on earnings call...and more tech news.
Cisco this week announced intentions to acquire Tropo, a developer of software designed to embed real-time communications within cloud applications.
Three men accused of selling and exporting over $10 million worth of fake Cisco networking equipment into the U.S. have been arrested by U.K. police.
Security orchestration methods and of course SDN is driving the need for programmable interfaces in security products. The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release. I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities. Thank you Mason for the great information.
Disaggregation seems to be all the rage in networking these days.
It was all the way back in the Spring of 2011 that Google released WebRTC, its nascent real-time, browser-based, HTML5-powered, no-plugin-required video chat project to the public. In the three and a half years since, the Internet Engineering Task Force and the W3C have been working together to try to formalize the standard, prepare the stable 1.0 release, and get it ready for prime time.
The engineering reorganization currently underway at Cisco is intended to streamline product development and delivery to customers, Cisco says.
On the surface, Cisco and Juniper's SDN strategies seem to have sharp contrasts if recent announcements are any indication.
From software defined networking challenges to killing Cius and corporate restricting moves, it was a busy year for Cisco.
Whitepapers about cisco
What can malware do in 60 seconds? One minute can change everything for a business. The speed of business is all about being responsive to customers and stakeholders. So what happens when the speed of business is overtaken by the speed of malware? Given the unprecedented growth in the number of security threats that focus on stealing data, sabotaging business continuity and damaging a company’s reputation, what should organizations do to ensure the speed of malware doesn’t disrupt the speed of business? T
- Review: Windows 10 Insider Preview -- a nearly finished OS
- Microsoft implores enterprises to help it test optional Windows 7 updates
- 7 free Wi-Fi stumbling and surveying tools for Windows and Mac
- Sony's Xperia Z4 renamned Z3+ outside Japan, goes on sale in June
- Wearables to hit stride in enterprises from 2017: Frost & Sullivan
- Qantas sets up new panel for Red Planet to conduct market research
- Updated: REA's marketing strategy chief takes CMO post at MYOB
- TedxSydney taps into real-time social to fuel engagement
- Why optimisation is the name of the game at First
- Video, mobile show strong growth in IAB's Q1 online advertising report