Home Blog Page 2

How Cisco is closing the hole on accessibility


technology entrepreneur Joe Devon and Ben Ogilvie, head of accessibility at ArcTouch, not too long ago visited Cisco, they talked about how each GenX and Millennials are “growing old into incapacity. 

These of us in these generations, they defined, might be in for a impolite awakening: On the one hand, we’re not digital natives, however we’ve spent the final couple of many years acclimating to a world of apps and digital companies. Then again, the digital world as a rule stays inaccessible to these with lack of imaginative and prescient, listening to, and mobility.

Coming generational shift highlights present disparities

Man with glasses squinting while looking at his cell phone at arms length Man with glasses squinting while looking at his cell phone at arms length
GenX and Millennials are growing old right into a digital world usually inaccessible to these with lack of imaginative and prescient, listening to, and mobility

The oldest Millennials are actually of their early 40s and GenX is of their mid-40s to 60—all prime ages for starting to expertise typical age-related degradation of imaginative and prescient, listening to, and mobility.

Should you’re in certainly one of these cohorts, you might already be getting a preview of those challenges courtesy of the experiences of your Best Technology and Boomer dad and mom.

The concept of an enormous generational shift the place digitally savvy customers lose entry to the instruments they’ve come to depend on brings into stark aid what hundreds of thousands of disabled folks already expertise immediately: 98% of internet sites should not totally accessible and 80% of disabled folks say on-line experiences are failures. [1], [2]

Many digital experiences include accessibility “tax”

Devon, co-founder of GAAD and chair of the GAAD Basis, and Ogilvie, a member of the GAAD Basis board of administrators, shared their feedback as a part of a hearth chat hosted by our Linked Incapacity Motion Community (CDAN) worker group in celebration of International Accessibility Consciousness Day (GAAD) earlier this month.

As they defined, even when an accessible model of a digital expertise is obtainable, it usually comes with a tax: additional steps and extra complexity to finish duties.

In conditions like that, creators might be able to make a technical declare that their merchandise are accessible. However such experiences fall far in need of assembly the wants of all customers in a significant approach.

Workplace of Accessibility champions entry by means of innovation

Cisco has lengthy had a workforce and processes devoted to making sure our merchandise meet accessibility necessities of laws equivalent to Part 508 of the US Rehabilitation Act of 1973 and the Individuals with Disabilities Act.

Final 12 months, we took a strategic step ahead to additional shut the digital accessibility divide by establishing the Workplace of Accessibility to speed up our progress on embedding accessibility all through our enterprise.

Powering a greater expertise for all

Since its founding 18 months in the past, the Workplace of Accessibility has change into Cisco’s central level for advancing digital accessibility, schooling and consulting about accessibility, and connecting with stakeholders.

“Cisco’s Workplace of Accessibility will speed up our progress on embedding accessibility all through our enterprise.”

The Workplace of Accessibility has introduced collectively a workforce of accessibility subject-matter consultants to make sure accessibility is a key consideration in all enterprise choices—from each stage of the product lifecycle to capabilities equivalent to procurement, M&A, and the worker expertise.

Embracing greater requirements

One of many methods we’re doing that is by constructing a community throughout our portfolio of a whole bunch of merchandise that features engineers, product managers, and designers to unify our strategy to accessibility.

That is vital as we not too long ago moved to testing all our web-based merchandise—together with desktop and cellular purposes—in addition to our internet pages and digital product documentation towards Internet Content material Accessibility Pointers (WCAG) 2.2.

WCAG 2.2 is essentially the most up-to-date business customary for digital accessibility. It covers design steerage that enhances the usability of digital merchandise for folks with visible, auditory, or mobility limitations.

Later this 12 months, we shall be introducing a brand new Digital Accessibility Coverage that can assist standardize how we strategy digital accessibility all through our enterprise—every little thing from the merchandise we construct to the work instruments our staff use.

Ambassadors and Champions will amplify our efforts

We’ve expanded alternatives for all staff to be taught extra about tips on how to incorporate accessibility practices into their work. For instance, all Cisco employees now have entry to a complete coaching suite that gives common accessibility data; classes on tips on how to create accessible paperwork, spreadsheets, and displays; and accessibility practices for each common enterprise and technical job roles.

Moreover, our Accessibility Ambassadors and Accessibility Champions will deliver present accessibility greatest practices to front-line groups throughout the corporate, serving to us to make the best way we work with our clients, companions, and one another extra inclusive.

Constructing accessibility for all

Cisco goals to make sure that our merchandise and instruments are accessible for all. Designing accessible experiences in partnership with main minds in design is a problem and alternative we’re eagerly embracing, and we look ahead to making a digital future that’s accessible to folks of all skills.

Be taught extra about Accessibility at Cisco.

Share:

‘Stealthy’ lipid nanoparticles give mRNA vaccines a makeover – NanoApps Medical – Official web site


A brand new materials developed at Cornell College may considerably enhance the supply and effectiveness of mRNA vaccines by changing a generally used ingredient that will set off undesirable immune responses in some individuals.

Because of their potential to coach cells to supply virus-killing proteins, mRNA vaccines have gained recognition during the last 5 years for his or her success in decreasing the severity of COVID-19 an infection.

One technique for delivering the mRNA to cells is by packaging it inside fatty spheres, referred to as lipid , that defend it from being degraded. Nevertheless, a typical element of lipid nanoparticles referred to as poly-ethylene glycol (PEG) can provoke immune responses in some people, main researchers to seek for extra biocompatible supplies.

Shaoyi Jioang, professor of biomedical engineering, is working to interchange the PEG element of lipid nanoparticles with a extra adaptable and stealthy choice. The analysis is printed within the journal Nature Supplies.

The supply automobile for an mRNA vaccine must strike a Goldilocks steadiness—secure sufficient to guard the mRNA, but labile sufficient to launch it inside cells, and shielded sufficient to evade immune surveillance, however not so hidden that it hinders mobile uptake. PEG does the job however presents some unintended unintended effects in a small subset of people.

“The human physique is usually water, so if you happen to insert one thing with uncovered hydrophobic moieties, like PEG, into our bloodstream, our immune surveillance system says, ‘Hey, that’s a international materials,’ and can generate an antibody to destroy it,” stated Jiang. This atmosphere makes antagonistic responses to a vaccine extra doubtless and thus makes it more durable for the vaccine to do its job.

Most individuals’s immune programs are already primed to battle PEG. Prior analysis exhibits {that a} majority of individuals have anti-PEG antibodies “from individuals being uncovered to PEG in so many industrial merchandise like shampoo and toothpaste,” stated Jiang, including that this widespread publicity might clarify why the physique is so fast to flag PEG as a menace.

To unravel this, Jiang has developed lipid nanoparticles that use a zwitterionic polymer, a vital various to PEG, enhancing the efficiency and biocompatibility of the system.

Because of the super-hydrophilic, or water-loving, nature of zwitterions, this materials is ready to mix into the physique and ship the mRNA extra simply. This particular naturally derived materials, referred to as poly(carboxybetaine) (PCB), has an ideal steadiness of stealth and stability.

In his latest paper, Jiang discovered that changing PEG with PCB in  ends in extremely efficient mRNA vaccines that don’t adversely set off the physique’s immune system.

Jiang is working with Weill Cornell Drugs, Houston Methodist Most cancers Heart, the Hospital for Sick Youngsters in Toronto, and the Nationwide Most cancers Institute to maneuver this discovery towards medical functions, particularly within the improvement of mRNA-based most cancers vaccines.

The zwitterionic nanoparticles assist sneak the vaccines previous the physique’s  in order that it induces antigen-specific immune responses whereas minimizing undesired immune activation.

“With a virus like COVID-19, you solely want a tiny vaccine dose, and our immune system will reply. However for a most cancers vaccine, the tumor atmosphere suppresses the immune system, so that you want a a lot increased dose to be efficient,” stated Jiang. “If a affected person has a minor downside due to the PEG, the problem will probably be amplified with a better dose.

Extra info: Nature Supplies (2025).

Offered by Cornell College

The Name for Community Forensics Specialists


Enterprises are realizing they may want extra ammunition of their unending battle towards ransomware.

Enter community forensics, a department of digital forensics. Community forensics practitioners are the detectives of community safety, centered on monitoring and evaluating all of the digital site visitors on a community. Their objective is to uncover details about intrusions, comparable to malware, and to assemble authorized proof within the occasion of a courtroom case.

The worth of digital forensics is underscored by a report from Malaysian safety agency AKATI. The corporate highlighted the case of a healthcare establishment that in early 2025 suffered an enormous ransomware assault that crippled a number of techniques, IT infrastructure and enterprise operations. Ransom notes had been deposited in all places throughout the community. System backups and shadow copies of information had been deleted, which impaired knowledge restoration. Community safety exercise logs had been worn out, and any remaining knowledge was encrypted in a means that the corporate couldn’t decipher it.

Understanding the Assault

This group wanted two issues following this ransomware assault:

  • To get its community, techniques and knowledge up and operating once more.

  • To know the complete extent of the assault — the way it occurred, the way it labored and why it was as profitable because it was.

Associated:The Community Impression of Cloud Safety and Operations

Studying why the assault occurred and tips on how to forestall related ransomware incidents sooner or later required greater than reviewing normal safety actions and logs, which had largely been worn out. But, investigating such a complicated intrusion surpassed the information base and expertise of the healthcare group’s inside community personnel. The corporate determined to usher in community forensics specialists.

The following investigation revealed a multi-phased, rigorously deliberate and executed malware assault that started with the execution of an unauthorized file by an unsuspecting person. From there, the attackers gained management over a number of techniques and established distant connections that enabled them to maneuver undetected between servers. They had been in a position to do all this as a result of that they had simply cracked weak community administrator credentials. By the point the corporate turned conscious of the intrusion, the attackers had all the info and the community itself below management.

Do Corporations Want Community Forensics Expertise?

Ransomware assaults are on the rise. Based on a 2024 report issued by Ransomware.org, greater than half of the businesses surveyed reported that they had skilled a ransomware assault. The biggest single payout: an eye-popping $75 million, in line with a separate ransomware examine by Zscaler.

Associated:NVIDIA Beefs up its AI Safety Capabilities with DOCA Argus

Corporations of all sizes want some kind of ransomware plan that goes past what normal community safety monitoring can do. That functionality is one thing that cyber insurance coverage corporations are more and more demanding as nicely.

The catch is that expertise like forensics are unusual amongst most community staffs. When corporations attempt to rent somebody with refined community malware-fighting expertise, it prices them cash, with salaries commanding six figures, in line with ZipRecruiter.

Banks, brokerage homes, massive healthcare techniques, life science corporations, protection corporations, governments, insurance coverage corporations and pharmaceutical corporations are among the many probably enterprises to rent inside community forensics specialists. For different organizations, discovering community forensics experience will contain both hiring an out of doors agency to do the work, or cross-training somebody who’s already on workers with forensics expertise.

What Do Community Forensic Specialists Do?

Community forensic specialists oversee most of the areas common community professionals cowl, comparable to monitoring the community, finding out the info touring via the community and digging down into completely different layers of the OSI community communications framework when wanted. These execs additionally examine IP addresses, safety, person site visitors and authentications — however from this level, it will get deeper and extra specialised.

Associated:Edge Computing and the Burgeoning IoT Safety Risk

Community forensic specialists prepare their concentrate on monitoring and investigating community threats and suspicious incidents. Different instances, probes is perhaps associated to authorized discovery and legal investigations. Following a safety compromise, an organization may name in a community forensics specialist to analysis it. How did it occur? When did it occur? Who had been the perpetrators? What knowledge and community property had been affected?

To perform duties like these, community forensics specialists normally have no less than three years of community expertise. They’ve or are taking superior coaching, incomes certificates comparable to the next:

  • Licensed Community Forensics Examiner.

  • Licensed Cyber Forensics Skilled.

  • Licensed Community Defender.

  • Licensed Moral Hacker.

  • Licensed Forensic Laptop Examiner.

Specialised coaching equips them with the talents they want for detailed forensics work, in addition to the information required to deploy specialised instruments that common community professionals do not usually use. Community forensics specialists are additionally known as upon to cross-train community workers members, doubtlessly mentoring others who may assume a future function.

Equally necessary, forensics professionals should be wonderful drawback solvers and communicators. They have to possess the tender expertise wanted to speak with safety and community groups, auditors and regulators — but in addition with administration, the authorized group and doubtlessly with legislation enforcement.

Ought to Corporations Spend money on Community Forensics Expertise?

The brief reply is sure, corporations ought to make investments. Cybercrime is turning into more and more refined, and community expertise should turn out to be extra refined as nicely.

The trick for community managers, particularly at smaller corporations, is tips on how to convey forensics expertise onboard. Most organizations cannot afford to rent a full-time forensics workers individual, nor can they keep forensics consultants for lengthy durations. One choice: Equip an current community staffer with the coaching, programs and mentoring from an out of doors professional.

In the meantime, listed here are a number of on a regular basis practices designed to scale back the danger of not gaining access to a full-time community forensics professional.

Give attention to prevention. You have bullet-proofed your community from many malware assaults by bolting down your community boundaries and segments and performing common safety audits. Your organization diligently screens community site visitors and person credentials and actions. However there’s extra you need to do. Prepare customers on the significance of utilizing sturdy person IDs and passwords. Use multi-factor authentication and contemplate rolling out passkeys. Guarantee customers safe their departments’ IT and units after they’re not utilizing them.

Do not shirk on documentation. Community staffs battle to maintain documentation up to date, however with authorized forensics, it is important to make sure the chain of information custody is uninterrupted. Observe and hint documentation, in addition to licensed procedures and operations to maintain knowledge protected and safe.

Begin with a micro examination of community exercise after which transfer upward. Community forensics specialists proceed from essentially the most microscopic layers of the OSI mannequin via classes, purposes and content material evaluation. This tactic must also be inspired for community workers. This embeds the concept of detailed examination and troubleshooting from the bottom up. Everyone seems to be searching for each conceivable malware entry level — with the objective of locking down community vulnerabilities earlier than any breach happens.



Introducing Safe Entry – DNS Protection


Price-effective safety of your group’s community and customers is crucial. That’s why I’m excited to announce the provision of Cisco Safe Entry – DNS Protection, the latest member of the Safe Entry product household.

Constructing upon Cisco’s place because the main supplier of DNS-layer safety, we now provide a seamless pathway to our Common ZTNA resolution. Whether or not you’re a potential buyer seeking to strengthen your community and consumer safety, or an present Cisco Umbrella DNS buyer exploring what’s subsequent, Safe Entry – DNS Protection delivers worth, simplicity, and unmatched safety.

With hybrid work, organizations want consumer safety on and off the company community. Many need to safe customers and networks with a scalable basis for zero belief safety. Cisco Safe Entry – DNS Protection delivers each with strong foundational safety that’s easy to deploy.

Cisco Safe Entry – DNS Protection employs superior AI-powered capabilities, equivalent to DNS tunneling mitigation and Area Era Algorithm (DGA) detection, to cease subtle threats earlier than they’ll take maintain. These enhancements construct upon Cisco’s prime business rating in DNS-layer safety, as acknowledged by GigaOM and Miercom, guaranteeing you’re shielded from ransomware, phishing, and superior threats.

Throughout 190+ international locations, Cisco processes over 800 billion DNS requests every day, affording us unparalleled visibility into international threats. Safe Entry – DNS Protection delivers sooner, extra exact menace detection with fewer false positives. This ensures threats are stopped on the DNS layer—earlier than they’ll even attain your community and endpoints.

In contrast to different Safe Service Edge (SSE) options which have added fundamental DNS safety in a “checkbox” try to satisfy market demand, Cisco Safe Entry – DNS Protection embeds sturdy safety into its international community of fifty+ DNS information facilities. Amongst all SSE options, solely Cisco’s includes a recursive DNS structure that ensures low-latency, quick DNS decision, and seamless failover, delivering a superior consumer expertise with stronger menace protection.

For organizations leveraging SaaS platforms like Microsoft 365, Google Workspace, and Field, Safe Entry – DNS Protection (Benefit Bundle) consists of SaaS API Knowledge Loss Prevention (DLP) to find and defend delicate information saved and shared in your cloud-sanctioned functions. Additional, it consists of Cloud Malware Safety to establish and take away malware from cloud file storage functions, stopping malicious information from reaching endpoints. These options routinely defend delicate information in cloud functions, serving to you keep compliance, and safeguard your mental property.

When you’re an present Cisco Umbrella DNS buyer, we’ve designed Safe Entry – DNS Protection with you in thoughts. Our purpose is to offer a easy improve path to our most fashionable platform, offering you with extra worth, safety, and functionality — with out further price.

Upgrading has by no means been simpler. With our Improve Supervisor constructed into the Umbrella dashboard, upgrading to Safe Entry – DNS Protection is straightforward. Your configurations are seamlessly transferred, and your present insurance policies are routinely transformed to a simple to handle rules-based coverage, guaranteeing zero disruption to your operations.

Safe Entry – DNS Protection retains the options you’ve come to depend upon with Umbrella DNS whereas including the highly effective new capabilities of cloud malware scanning and SaaS API DLP—at no further price. Whether or not you select DNS Protection solely or discover the broader potentialities of Cisco’s Safe Entry product household, Safe Entry adapts as your wants change.

Safe Entry – DNS Protection can act as an onramp to Cisco’s Common ZTNA imaginative and prescient. If you’re prepared, you’ll be able to simply add further built-in SSE elements—like Zero Belief Community Entry (ZTNA) and Safe Web Entry (SIA) with full DLP, CASB, SWG, RBI and extra—all throughout the identical unified console, and at your personal tempo.

We’re honored to be the trusted DNS-layer safety associate for over 40,000 prospects worldwide. Safe Entry – DNS Protection is designed to satisfy the wants of organizations of all sizes. For potential prospects, it’s probably the most cost-effective method to improve your safety posture, defend your hybrid workforce, and speed up connectivity. For our valued Umbrella DNS prospects, it’s a seamless, cost-neutral improve that delivers even higher worth.


We’d love to listen to what you suppose! Ask a query and keep related with Cisco Safety on social media.

Cisco Safety Social Media

LinkedIn
Fb
Instagram
X

Share:



Chip Design within the AI Period with Thomas Andersen


Synopsys is a number one digital design automation firm specializing in silicon design and verification, in addition to software program integrity and safety. Their instruments are foundational to the creation of recent chips and embedded software program, powering all the things from smartphones to vehicles.

Chip design is a deeply complicated course of, typically taking months or years and requiring the coordination of 1000’s of engineers. Now, advances in AI are starting to rework the sphere by lowering handbook effort, accelerating timelines, and unlocking new design prospects.

Thomas Andersen is the Vice President of AI and Machine Studying at Synopsys, the place he has spent over 15 years. He joins the present to speak with Kevin Ball in regards to the evolving position of AI in {hardware} design, the challenges of coaching fashions on tacit, undocumented chip engineering information, the emergence of domain-specific LLMs, and the place this fast-moving discipline goes subsequent.

Kevin Ball or KBall, is the vp of engineering at Mento and an unbiased coach for engineers and engineering leaders. He co-founded and served as CTO for 2 corporations, based the San Diego JavaScript meetup, and organizes the AI inaction dialogue group by means of Latent House.

 

 

Please click on right here to see the transcript of this episode.

Sponsors

This episode of Software program Engineering Day by day is dropped at you by Capital One.

How does Capital One stack? It begins with utilized analysis and leveraging information to construct AI fashions. Their engineering groups use the ability of the cloud and platform standardization and automation to embed AI options all through the enterprise. Actual-time information at scale allows these proprietary AI options to assist Capital One enhance the monetary lives of its clients. That’s know-how at Capital One.

Be taught extra about how Capital One’s fashionable tech stack, information ecosystem, and utility of AI/ML are central to the enterprise by visiting www.capitalone.com/tech.