array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(27) "CISCO INTERNATIONAL LIMITED"
["slug"]=>
string(36) "8d023-gb-cisco-international-limited"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/67b7854f-58f3-47d0-b86d-ae1839283873"
["description"]=>
string(1233) "Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time.
Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services.
Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers."
["address_street"]=>
string(15) "9-11 New Square"
["address_place"]=>
string(7) "FELTHAM"
["address_region"]=>
NULL
["founding_date"]=>
string(10) "2008-07-08"
["website_domain"]=>
string(9) "cisco.com"
["website_url"]=>
string(21) "https://www.cisco.com"
["industry_codes"]=>
array(2) {
[0]=>
string(29) "Computer Programming Services"
[1]=>
string(51) "Computer Related Services, Not Elsewhere Classified"
}
["employee_count"]=>
int(3061)
["article_count"]=>
int(2036)
}
["articles"]=>
array(9) {
[0]=>
array(7) {
["title_en"]=>
string(54) "Cisco's Duo MFA message logs stolen in phishing attack"
["snippet_en"]=>
string(99) "Also warns of brute force attacks targeting its own VPNs, Check Point, Fortinet, SonicWall and more"
["url"]=>
string(53) "https://www.theregister.com/2024/04/17/cisco_duo_vpn/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/f2713d19-c9bf-4779-8228-4d3abfb034b5"
["source"]=>
string(15) "theregister.com"
["publication_date"]=>
string(10) "2024-04-17"
["categories"]=>
array(2) {
[0]=>
string(15) "Corporate Theft"
[1]=>
string(10) "Cybercrime"
}
}
[1]=>
array(7) {
["title_en"]=>
string(99) "Millions of login attempts: Cisco warns of massive hacking campaign against VPN services | Version2"
["snippet_en"]=>
string(107) "Attacks can lead to unauthorized network access, locked account or *denial-of-service*, writes Cisco Talos."
["url"]=>
string(115) "https://www.version2.dk/artikel/millioner-af-login-forsoeg-cisco-advarer-om-massiv-hackerkampagne-mod-vpn-tjenester"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/6637c4e7-950b-4b9f-a9a5-6c35a92dc7d2"
["source"]=>
string(11) "version2.dk"
["publication_date"]=>
string(10) "2024-04-17"
["categories"]=>
array(1) {
[0]=>
string(21) "Cultural developments"
}
}
[2]=>
array(7) {
["title_en"]=>
string(67) "Panos Xenokostas: The next day of the Onex Group | Naval Chronicles"
["snippet_en"]=>
string(146) "Panos Xenokostas, President of the Hellenic Shipyards Association, President & CEO of ONEX Group, participated in the Delfi Economic Forum IX, the"
["url"]=>
string(90) "https://www.naftikachronika.gr/2024/04/16/panos-xenokostas-h-epomeni-mera-tou-omilou-onex/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/3036717f-4427-4706-93e1-0448b717a971"
["source"]=>
string(18) "naftikachronika.gr"
["publication_date"]=>
string(10) "2024-04-16"
["categories"]=>
array(2) {
[0]=>
string(18) "Expansion & Growth"
[1]=>
string(13) "Collaboration"
}
}
[3]=>
array(7) {
["title_en"]=>
string(98) "Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials"
["snippet_en"]=>
string(293) "Cisco Talos would like to acknowledge Brandon White of Cisco Talos and Phillip Schafer, Mike Moran, and Becca Lynch of the Duo Security Research team for their research that led to the, identification of these attacks.Cisco Talos is actively monitoring a global increase in brute-force attacks"
["url"]=>
string(133) "https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/f5f5c2ce-e1bb-454c-845c-1a8800d6fe5f"
["source"]=>
string(21) "talosintelligence.com"
["publication_date"]=>
string(10) "2024-04-16"
["categories"]=>
array(0) {
}
}
[4]=>
array(7) {
["title_en"]=>
string(76) "Nevada Secretary of State’s Office investigates 146 cases of double-voting"
["snippet_en"]=>
string(146) "Since 2022, five cases of possible election violations have been referred for prosecution by the Secretary of State's Office led by Cisco Aguilar."
["url"]=>
string(108) "https://www.rgj.com/story/news/politics/elections/2024/04/16/nevada-investigates-election-fraud/73334913007/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/4cdbd9ba-7803-4116-92e5-08b57a85cf3c"
["source"]=>
string(7) "rgj.com"
["publication_date"]=>
string(10) "2024-04-16"
["categories"]=>
array(2) {
[0]=>
string(5) "Legal"
[1]=>
string(24) "Quarterly/Annual Figures"
}
}
[5]=>
array(7) {
["title_en"]=>
string(115) "Enterprise hits and misses - Google Next pitches AI agents, Cisco Splunks, and AI customer service gets scrutinized"
["snippet_en"]=>
string(207) "This week - Google stakes its AI claim at Cloud Next, but are AI agents ready for prime time? Cisco's Splunk acquisition is official, and customer service AI bots bring new proof points - and fresh whiffery."
["url"]=>
string(122) "https://diginomica.com/enterprise-hits-and-misses-google-next-pitches-ai-agents-cisco-splunks-and-ai-customer-service-gets"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/1c6868c2-d82c-47f2-b7e7-c028accad15b"
["source"]=>
string(14) "diginomica.com"
["publication_date"]=>
string(10) "2024-04-15"
["categories"]=>
array(0) {
}
}
[6]=>
array(7) {
["title_en"]=>
string(60) "Green hydrogen tech boss warns of AI energy consumption risk"
["snippet_en"]=>
string(156) "Ceres Power's CTO warned that as AI tools become more widely used for efficiency there is also the risk that this could result in higher energy consumption."
["url"]=>
string(97) "https://www.cnbc.com/2024/04/15/green-hydrogen-tech-boss-warns-of-ai-energy-consumption-risk.html"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/afb172be-1f2e-4c11-8381-c18c8b9f783d"
["source"]=>
string(8) "cnbc.com"
["publication_date"]=>
string(10) "2024-04-15"
["categories"]=>
array(3) {
[0]=>
string(18) "Ecological Impacts"
[1]=>
string(17) "Energy Management"
[2]=>
string(6) "Energy"
}
}
[7]=>
array(7) {
["title_en"]=>
string(77) "Cisco: Hacker breached multifactor authentication message provider on April 1"
["snippet_en"]=>
string(113) "Cisco said the breach occurred in the system of a telephony supplier that its Duo unit uses to send MFA messages."
["url"]=>
string(68) "https://therecord.media/cisco-duo-data-breach-mfa-telephony-provider"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/8b496994-ae9d-4629-8e3a-232878ea9699"
["source"]=>
string(15) "therecord.media"
["publication_date"]=>
string(10) "2024-04-15"
["categories"]=>
array(2) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(5) "Legal"
}
}
[8]=>
array(7) {
["title_en"]=>
string(96) "Brands Beware: The Application Generation Demands Seamless Digital Experiences | TahawulTech.com"
["snippet_en"]=>
string(146) "Gregg Ostrowski, CTO Advisor, Cisco Observability, writes an exclusive opinion piece for Tahawultech on how brands have been steadily adapting ..."
["url"]=>
string(117) "https://www.tahawultech.com/home-slide/brands-beware-the-application-generation-demands-seamless-digital-experiences/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/b0ace15a-3a01-4fd7-af49-ffdd206f6bbd"
["source"]=>
string(15) "tahawultech.com"
["publication_date"]=>
string(10) "2024-04-15"
["categories"]=>
array(0) {
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(276)
}
[1]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(239)
}
[2]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(231)
}
[3]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(134)
}
[4]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(98)
}
[5]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(89)
}
[6]=>
array(2) {
["name"]=>
string(16) "Customer Privacy"
["count"]=>
int(76)
}
[7]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(74)
}
[8]=>
array(2) {
["name"]=>
string(18) "Expansion & Growth"
["count"]=>
int(64)
}
[9]=>
array(2) {
["name"]=>
string(41) "E-commerce and Technological Developments"
["count"]=>
int(58)
}
[10]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(57)
}
[11]=>
array(2) {
["name"]=>
string(15) "Market Movement"
["count"]=>
int(53)
}
[12]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(49)
}
[13]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(48)
}
[14]=>
array(2) {
["name"]=>
string(18) "General Investment"
["count"]=>
int(44)
}
[15]=>
array(2) {
["name"]=>
string(31) "Financial Update/Profit Warning"
["count"]=>
int(43)
}
[16]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(40)
}
[17]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(40)
}
[18]=>
array(2) {
["name"]=>
string(7) "Layoffs"
["count"]=>
int(36)
}
[19]=>
array(2) {
["name"]=>
string(5) "Event"
["count"]=>
int(36)
}
[20]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(32)
}
[21]=>
array(2) {
["name"]=>
string(15) "Deals & Tenders"
["count"]=>
int(30)
}
[22]=>
array(2) {
["name"]=>
string(12) "Staff hiring"
["count"]=>
int(24)
}
[23]=>
array(2) {
["name"]=>
string(19) "Green & Responsible"
["count"]=>
int(23)
}
[24]=>
array(2) {
["name"]=>
string(23) "Supply Chain Management"
["count"]=>
int(22)
}
[25]=>
array(2) {
["name"]=>
string(21) "Competitive Behaviour"
["count"]=>
int(22)
}
[26]=>
array(2) {
["name"]=>
string(17) "Energy Management"
["count"]=>
int(22)
}
[27]=>
array(2) {
["name"]=>
string(17) "Academic Research"
["count"]=>
int(21)
}
[28]=>
array(2) {
["name"]=>
string(11) "Competition"
["count"]=>
int(21)
}
[29]=>
array(2) {
["name"]=>
string(37) "Product Design & Lifecycle Management"
["count"]=>
int(17)
}
}
}
8d023-gb-cisco-international-limited
CISCO INTERNATIONAL LIMITED
Location
Founded
2008-07-08
Website
https://www.cisco.com
Articles
2036 Articles
Category
Computer Programming Services
Computer Related Services, Not Elsewhere Classified
Description
Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time.
Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services.
Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.
Cisco Talos would like to acknowledge Brandon White of Cisco Talos and Phillip Schafer, Mike Moran, and Becca Lynch of the Duo Security Research team for their research that led to the, identification of these attacks.Cisco Talos is actively monitoring a global increase in brute-force attacks
This week - Google stakes its AI claim at Cloud Next, but are AI agents ready for prime time? Cisco's Splunk acquisition is official, and customer service AI bots bring new proof points - and fresh whiffery.
Ceres Power's CTO warned that as AI tools become more widely used for efficiency there is also the risk that this could result in higher energy consumption.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.