Remove Backup Remove Conference Remove Security
article thumbnail

Cisco CEO: There's no enterprise perimeter to defend anymore

Network World

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021. Backup lessons from a cloud-storage disaster.

article thumbnail

Cisco CEO on security: "There is really no perimeter in the enterprise to defend anymore.”

Network World

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021. Backup lessons from a cloud-storage disaster.

Security 259
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Four questions for a casino InfoSec director

CIO Business Intelligence

With the CSO50 Conference + Awards coming to the We-Ko-Pa Casino Resort in Fort McDowell, Arizona, October 2-4, we asked Bill Tsoukatos, Information Technology Director at Fort McDowell Enterprises, which owns the resort, to tell us what it’s like to manage IT security at a casino property.

article thumbnail

Quantum Threats and How to Protect Your Data

SecureWorld News

Quantum computing brings both opportunities for advancement and significant security challenges. Quantum computing can rapidly process large datasets, benefiting fields like AI and machine learning, but it also poses a risk to current encryption by potentially decrypting secure data.

Data 114
article thumbnail

Avoiding Last-Mile Challenges for Remote Workers

CIO Business Intelligence

But there’s one catch we often hear regarding productivity, and that is inconsistent Internet connections that downgrade the experience, particularly while conducting conference calls or sharing material from a home office. The average remote worker, BYOD remote worker, power remote worker, high-security remote worker, or executives?

Internet 246
article thumbnail

How to create an effective business continuity plan

CIO Business Intelligence

Moreover, there are increasing consumer and regulatory expectations for both enterprise security and continuity today. A tabletop exercise usually occurs in a conference room with the team poring over the plan, looking for gaps and ensuring that all business units are represented therein.

article thumbnail

Anticipating Black Hat

Network World

Now Black Hat has become a technically-focused little brother of the RSA Security Conference, chock full of cybersecurity geeks at the beginning of the week and forensic investigators, researchers, analysts, and hackers as Black Hat turns to Defcon. Alternatively, you can pony up a bunch of rubles to Vladimir in Odessa.

Backup 150