Tuesday, 21 November 2023

Cisco DNA Center Has a New Name and New Features

Cisco DNA Center is not only getting a name change to Cisco Catalyst Center, it also offers lots of new features, and add-ons in the API documentation. Let me tell about some of them.Version selection menuThe first improvement I want to mention is the API documentation version selection...

Saturday, 18 November 2023

The Power of LTE 450 for Critical Infrastructure

In case of disasters, a reliable communication network is critical. The emergency centers need to be able to exchange information to coordinate their response in the field. Service providers need to keep their network live. Power utilities need to be able to keep the electric grid up and...

Thursday, 16 November 2023

ESG Survey results reinforce the multi-faceted benefits of SSE

When it comes to protecting a hybrid workforce, while simultaneously safeguarding internal resources from external threats, cloud-delivered security with Security Service Edge (SSE) is seen as the preferred method.Enterprise Strategy Group (ESG) recently conducted a study of IT and security practitioners, evaluating their views on a number of...

Wednesday, 8 November 2023

The Evolution of Oil & Gas Industry

The Oil & Gas industry has changed a lot. From Upstream through to Downstream, advancements in technology have made operations safer and more productive. Those who work in the industry have a front row seat to these changes but most of us see the industry through mainstream information...

Tuesday, 7 November 2023

Bridging the IT Skills Gap Through SASE: A Path to Radical Simplification and Transformation

Imagine a world where IT isn’t a labyrinth of complexity but instead a streamlined highway to innovation. That world isn’t a pipe dream—it’s a SASE-enabled reality.As we navigate the complexities of a constantly evolving digital world, a telling remark from a customer onstage with me at Cisco Live...

Saturday, 4 November 2023

The myth of the long-tail vulnerability

Modern-day vulnerability management tends to follow a straightforward procedure. From a high level, this can be summed up in the following steps:Identify the vulnerabilities in your environmentPrioritize which vulnerabilities to addressRemediate the vulnerabilitiesWhen high-profile vulnerabilities are disclosed, they tend to be prioritized due to concerns that your organization...

Pages (26)1234567 »