Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

Data Security Posture Management: Enhancing Data Visibility and Control to Safeguard Cloud Native Applications

Wednesday, Jul 31st, 2024 Data breaches are a constant threat in today’s cybersecurity landscape, putting organizations’ sensitive information at risk. As businesses move to cloud-native environments, securing data becomes even more crucial. Data Security Posture Management (DSPM) is a proactive approach that helps organizations manage and protect their data assets.

Identity Orchestration and Authorization with Gerry Gebel

Welcome to another insightful episode of Cloud Unfiltered! In this episode, host Michael Chenetz is joined by Jerry Gebel, VP of Product and Standards at Strata Identity, to delve into the crucial topics of identity orchestration and authorization. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Acorn Labs on GPTScript and AI

Shannon Williams and Darren Shepherd discuss their new open source solution called, GPTScript and how the exciting world of AI is evolving. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Strategies for Increasing AI Efficiency - Insights from the Cisco Research Efficient AI Summit

As AI models become more accurate, they are becoming much larger, requiring a significant amount of computing power to run. How can we make the future of AI more scalable and sustainable? Cisco Research hosted a virtual summit on efficient AI, bringing together researchers to explore efficient AI challenges and discuss opportunities for solving those challenges now and into the future. The Cisco Research team has been working on efficient AI initiatives for several years, contributing research papers and incorporating their work into an open-source project called ModelSmith.

How to Protect Your Business from Data Leaks

Friday, Jul 19th, 2024 In this blog, we're going to discuss how you can protect your business from data leaks that can result from insecure application programming interfaces. Cloud native applications are composed of loosely coupled microservices, which are predominantly intercommunicating via APIs.

Protect Your Business from Being Cryptojacked!

Cryptojacking is rapidly emerging as the most popular type of attack on cloud native applications and infrastructure. Care to guess how many cryptojacking attacks were recording in 2023? As a reference point, in the year before (2022), there were 139M cryptojacking attacks. However, this number jumped 659% the following year (2023) to 1.06B! That averages nearly 3M cryptojacking attacks every day, on average.