Avatar

Evelyn de Souza

Cloud Data Governance Leader

Chief Technology and Architecture Office

Evelyn de Souza focuses on developing industry blueprints that accelerate secure cloud adoption and streamline data protection. She also currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn was named to CloudNOW's Top 10 Women in Cloud Computing for 2014 and is the co-creator of Cloud Data Protection Cert, the industry's first blueprint for making data protection "business-consumable".

Articles

March 6, 2014

SECURITY

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…

March 6, 2014

DATA CENTER

Data Security Through the Cloud

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…

February 24, 2014

SECURITY

What will Security for the Network of the Future Look Like?

In the next few years, there will be more mobile users and more mobile connections than ever: By 2018, there will be 4.9 billion mobile users, up from 4.1 billion in 2013, according to the newly released Cisco VNI forecast In addition, there will be 10 billion mobile-ready devices and connections,…

February 13, 2014

DATA CENTER

CHAOS (Control Havoc and Overhaul Security): The new Order for IT

Mobility and the cloud have changed how we work, transforming pockets of downtime into bursts of productivity, with easy access to our most valued information and people. But this transformation has unleashed havoc. Security practices built on decades-old assumptions of placing controls at key point…

January 15, 2014

SECURITY

Mobile Security: Is the Risk Worth the Reward?

This blog is part two of a three-part blog series discussing how organizations can address mobile security concerns through an architectural approach to mobility. In my first post of this three-part series, I discussed how next-gen Wi-Fi models will pave the way for secure mobility and the value o…

December 19, 2013

SECURITY

What Next-Generation Wi-Fi Models Could Mean for Secure Mobility

With the adoption of the Internet of Things and Internet of Everything, advances in mobility and next-generation Wi-Fi are driving faster speeds, higher signal quality and more reliable connectivity. With the upcoming ratification of the two waves of the 802.11ac Wi-Fi standard, how are emerging Wi-…

September 10, 2013

DATA CENTER

August 2013 #SecureDC Twitter Chat Recap: SDN Security

Our first SecureDC twitter chat created some great industry dialog around security for Software Defined Networks (SDN) as well as using SDN to improve security. SDN is going through a similar hype cycle as seen with cloud and we feel that it’s important to focus more on education now and broader col…

August 19, 2013

DATA CENTER

Join @SecDatacenter and Top Industry Experts for #SecureDC Chat on SDN Security, 8/27 at 11am PT

Many network administrators over the years have viewed information security technologies as somewhat of a necessary evil, as opposed to a necessity. Security costs like the purchase and maintenance of firewalls, web filtering, anti-malware scanning, and encryption are seen as an additional burden as…

August 14, 2013

DATA CENTER

5 Areas of ROI on Data Center Security

As data center operations managers and business owners analyze their budgets to uncover economic headwinds, the importance of deriving ROI from each purchase and initiative is considered. To better understand the costs and benefits of the Cisco Secure Data Center Solution, we engaged with analyst fi…