Articles
IoT: Securing the Next Chapter of the Digitization “Book”
The Internet of Things (IoT) era is here: Nearly two-thirds of organizations currently collect data from equipment, devices or other connected endpoints and use it for a business purpose, according to survey findings from 451 Research. The most common sources of IoT data are equipment related to dat…
The Time Is Now for Organizations to Address Their Aging Infrastructure
Cisco has been working to draw attention to the hidden security risks organizations face by not properly maintaining their aging infrastructure and patching vulnerable systems. Threat actors, including ransomware operators, are using vulnerable Internet infrastructure as a foothold to launch their c…
Security and Trust That Is Foundational to Reducing Cyber Risks
Did you know that Cisco created the Cisco Secure Development Lifecycle (Cisco SDL) to ensure that security is central through the entire product development process? Cisco SDL is a repeatable and measurable process we’ve designed to fortify the resiliency and trustworthiness of our offerings. Are yo…
Built-In Security: Sharing the ‘How’
I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story. As I mentioned in a recent po…
Protect Your Entire Digital Self
How much time do you spend at work? For some the answer is too much! No matter how much time you spend, I’m willing to guess that it’s an important part of your week. Your work is part of who you are, where you go, and what you do. That is why Cisco is proud to join the National Cybersecurity Allian…
Are you protecting your organization with comprehensive security and trust?
With cyber threats escalating, security has emerged as a critical business driver and competitive differentiator. Organizations that successfully embed security throughout their network infrastructure, policies, processes, and culture are able to reduce risk while creating sustainable business advan…
Why Aging Infrastructure Is a Growing Problem
Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabil…
Update for Customers
Following a recent Juniper security bulletin discussing unauthorized code, we have fielded a number of related questions from our customers. Being trustworthy, transparent, and accountable is core to our team, so we are responding to these questions publicly. First, we have a “no backdoor” policy an…
Introducing the Cisco Technology Verification Service
Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this jour…
8