Network Solutions

11.6K posts

Network Solutions banner
Network Solutions

Network Solutions

@NSIguy

Cisco’s largest Indiana-based reseller, NSI brings exceptional, complete solutions to the mid-level and enterprise markets of Indiana and the surrounding states

Indiana Katılım Temmuz 2008
469 Takip Edilen506 Takipçiler
Network Solutions
Analysis of CISA's Known Exploited Vulnerabilities over the past four years shows critical vulnerabilities still open at Day 7 worsened from 56% to 63% despite teams closing 6.5x more tickets. Staffing cannot solve this. Of the 52 tracked weaponized vulnerabilities in our study, 88% were patched more slowly than they were exploited — half were weaponized before any patch existed. hubs.ly/Q04brvh30
Network Solutions tweet media
English
0
0
0
2
Network Solutions
Network Solutions@NSIguy·
A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations and universities in Taiwan. Cisco Talos researchers attribute the malware to a threat group tracked internally as UAT-10362, who they describe as a capable adversary "with mature operational tradecraft." hubs.ly/Q04btv3L0
Network Solutions tweet media
English
0
0
0
13
Network Solutions
Network Solutions@NSIguy·
Everyone’s racing to build AI agents. But very few are asking a harder question: How do you actually trust what those agents are doing? Cisco’s move to acquire Galileo signals a shift—AI observability isn’t a “nice to have” anymore, it’s becoming foundational. Galileo’s platform focuses on evaluating AI quality, detecting failures before users see them, and adding guardrails across the entire lifecycle. hubs.ly/Q04bqqSn0 The real story? We’re moving from building AI → to proving it works safely, reliably, and at scale. And that’s a much harder problem. Worth the read. #AI #Observability #CyberSecurity
English
0
0
0
4
Network Solutions
Everyone’s saying AI security needs to be “embedded from day one.” But here’s the uncomfortable truth: If you need to bolt security into your AI stack now… you’re already behind. AI isn’t just another workload—it’s an entirely different attack surface, with risks like prompt injection, model poisoning, and data leakage targeting the system at every layer. The real shift? This isn’t about adding more controls. It’s about admitting traditional security architectures were never designed for how AI actually operates. Maybe the question isn’t “how do we secure AI?” It’s “why are we still using old security models to protect it?” #AI #CyberSecurity #ZeroTrust
Network Solutions tweet media
English
0
0
0
7
Network Solutions
The next phase of AI infrastructure might not be limited by innovation… but by supply. Nvidia’s next-gen Rubin GPUs—expected to power the next wave of AI systems—are now facing potential delays due to supply chain constraints and memory shortages. That matters because these chips aren’t incremental—they’re foundational to scaling AI workloads across data centers and enterprises. The bigger takeaway? AI progress isn’t just a software story anymore—it’s deeply tied to hardware availability. And right now, hardware is the bottleneck. hubs.ly/Q04bfLNc0 #AI #Infrastructure #Semiconductors
English
0
0
1
16
Network Solutions
Security teams don’t need more alerts—they need faster, smarter response. That’s the promise behind XDRaaS. By bringing together endpoint, network, cloud, and identity data into one view, organizations gain real-time visibility, continuous monitoring, and coordinated response across the entire attack surface. The result? Less noise, faster containment, and security that actually scales with the business. Curious what that looks like in practice? Request your free demo. hubs.ly/Q049_4qx0 #CyberSecurity #XDR #SecurityOperations
Network Solutions tweet media
English
0
0
0
5
Network Solutions
Another reminder that attackers don’t always break in—they reroute you there. Authorities have disrupted a campaign using DNS hijacking to steal Microsoft 365 logins, redirecting users from legitimate domains to malicious infrastructure designed to capture credentials. It’s a powerful tactic: exploit trust in DNS, blend into normal traffic, and bypass traditional defenses. The takeaway? Identity security now depends just as much on infrastructure integrity as it does on passwords and MFA. hubs.ly/Q04b1zcP0 #CyberSecurity #IdentitySecurity #ZeroTrust #Microsoft365
Network Solutions tweet media
English
0
0
0
5
Network Solutions
AI security is no longer a vendor problem—it’s becoming a shared responsibility across the entire industry. #Cisco joining #Anthropic’s multi-vendor initiative signals a bigger shift: competitors collaborating to secure the very AI systems they’re racing to build. Why? Because the latest models can already discover—and even exploit—vulnerabilities across software ecosystems at scale. The takeaway: in the AI era, defense has to move just as fast as innovation—and no one can do it alone. hubs.ly/Q04b2xMs0 #AI #CyberSecurity #Innovation
English
0
0
0
7
Network Solutions
More users. More devices. More threats. If your network security can’t keep up, you’re exposed. AI-driven networking gives you real-time visibility and faster response—before issues escalate. Book Your Security Assessment Today hubs.ly/Q049Vkhr0 Or join us for a live seminar! hubs.ly/Q049Vjs20
Network Solutions tweet media
English
0
0
0
2
Network Solutions
AI is making wireless networks smarter—but it’s also exposing a hidden problem. New AI-driven tools can automate troubleshooting, optimize performance, and reduce manual work dramatically. But they also put pressure on legacy Wi-Fi infrastructure that wasn’t built for this level of intelligence or demand. The result? A growing gap between what modern networks can do—and what older environments can actually support. AI may simplify operations… but it’s accelerating the need to modernize. Interesting read. hubs.ly/Q049VVgj0 #AI #Networking #ITInfrastructure
Network Solutions tweet media
English
0
0
0
15
Network Solutions
Monitoring tells you something broke. Observability tells you why—and what to do next. As environments grow more complex across apps, networks, and cloud, traditional monitoring just can’t keep up. It’s reactive, siloed, and often misses the bigger picture. Observability changes that—connecting data across the entire stack to deliver real insight, faster resolution, and proactive performance. The shift isn’t optional anymore—it’s how modern IT keeps pace. hubs.ly/Q049VhkV0 #Observability #ITOperations #DigitalTransformation
Network Solutions tweet media
English
0
0
0
5
Network Solutions
Still running VMware? You’re not alone—but you do have options. Discover how migrating can reduce costs, simplify operations, and give you more control. Book a no-pressure migration assessment. hubs.ly/Q049MbgZ0 Or Join us for a live seminar! hubs.ly/Q049MfzK0
Network Solutions tweet media
English
0
0
0
8
Network Solutions
For the public sector, cybersecurity isn’t just about protection—it’s about proving compliance. That’s where mapping solutions to frameworks like NIST CSF 2.0 and NIST 800-53 becomes critical. By aligning identity and access controls directly to these standards, organizations can simplify audits, accelerate ATO timelines, and strengthen overall cyber resilience. () The takeaway? Security tools aren’t just controls anymore—they’re compliance enablers. Worth a read if you’re navigating federal or regulated environments. hubs.ly/Q049HGZx0 #CyberSecurity #ZeroTrust #PublicSector
English
0
0
0
10
Network Solutions
Network Solutions@NSIguy·
Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying users. Announced in September 2025, a beta version of this feature began rolling out to Google Workspace customers worldwide in early October. hubs.ly/Q049vd8y0
Network Solutions tweet media
English
0
0
0
14
Network Solutions
Network Solutions@NSIguy·
A new Android malware dubbed NoVoice exploited known vulnerabilities to gain root access and has been distributed through more than 50 apps on Google Play Store, with at least 2.3 million downloads. The apps carrying the malicious payload included cleaners, image galleries, and games. They required no suspicious permissions and provided the promised functionality. hubs.ly/Q049vqxh0
Network Solutions tweet media
English
0
0
0
24
Network Solutions
Network Solutions@NSIguy·
Trust is often talked about as the necessary foundation of AI, but in reality, it is not something we can simply declare. It has to be built, tested, and proven over time. That idea sits at the center of Cisco’s work with the National Institute of Standards and Technology (NIST) Generative AI Program. As AI becomes more embedded in how we work, govern, and connect, the real question is what AI can do and whether we can rely on it when it matters most. hubs.ly/Q049v8-q0
English
0
0
0
3
Network Solutions
Network Solutions@NSIguy·
Cisco has released security updates to address several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that allows attackers to gain Admin access. Also known as CIMC, Cisco IMC is a hardware module embedded on the motherboard of Cisco servers that provides out-of-band management (even if the operating system is powered off or crashed) for UCS C-Series and E-Series servers via multiple interfaces, including XML API, web (WebUI), and command-line (CLI). hubs.ly/Q049v8-x0
Network Solutions tweet media
English
0
0
0
21
Network Solutions
Network Solutions@NSIguy·
Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users. This occurs because residential proxies are too short-lived, uninvolved, or systematically rotated, preventing defense systems from cataloging them in time. hubs.ly/Q049vd_N0
English
0
0
0
69
Network Solutions
Network Solutions@NSIguy·
So you installed OpenClaw OpenClaw becomes powerful the moment it can connect a model to tools, skills, MCP servers, and a live workspace. That is also the moment security stops being optional. If you are evaluating OpenClaw, or planning to run it in front of real tools and data, the first question should not just be what the agent can do. The first question should be what happens if it trusts the wrong component. hubs.ly/Q049vkrh0
English
2
0
1
17