Avatar

Marc Blackmer

Product Manager, Engineering

IoT Product Mgmt Networking

Marc Blackmer is a technologist, blogger, and cybersecurity professional who has spent more than 20 years assisting some of the world's top energy producers, financial institutions, and governments worldwide defend their critical assets from cyber threats. His technical background in information technology engineering, ICS and IoT cybersecurity, and IT governance, risk, and compliance, brings a unique perspective to addressing the threats facing organizations today.

Marc is an advocate for STEM/STEAM education. He is also the founder of 1NTERRUPT, a 501(c)(3) non-profit created to engage and intrigue students about the exciting world of cybersecurity.

Articles

S4x20: The future of IIoT cybersecurity is here

It’s common knowledge that risks to the industrial Internet of Things (IIoT) and critical infrastructure are increasing. As a case in point, our Talos threat research team is now discovering more IoT-related vulnerabilities on a regular basis than traditional “IT” vulnerabilities. This week, while p…

December 17, 2019

INTERNET OF THINGS (IOT)

IIoT security tips and trends for 2020

It’s an exciting time to be in the industrial IoT security space. Having recently joined Cisco’s IoT security business unit as product manager for Cyber Vision, I’ve enjoyed seeing how the industry has evolved in just the past couple years. Current trends point clearly to opportunities for robust II…

August 29, 2019

SECURITY

Cisco Advanced Malware Protection for Endpoints Awarded AV-Comparatives’ Approved Business Product Award

We are very pleased to share the news that our Advanced Malware Protection (AMP) for Endpoints won the Approved Business Security Award from AV-Comparatives. And we’re happy about this for a couple of reasons. (Click this link to read the full report.) Most vendors’ marketing materials look great, y…

December 10, 2018

SECURITY

From Beginning to Endpoint: Covering All the Angles

For the myriad ways that an endpoint could be exploited, there’s just no way that a single technology will provide comprehensive protection. Without the visibility of your entire threat landscape and without the control to detect, block, and remediate an attack, you’re at an unfair disadvantage in p…

November 1, 2018

SECURITY

Going with what works: The state of phishing

Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes sense that when the bad guys find a reliable attack vector, like email phishing, they’ll use it for as long as it makes financi…

September 13, 2018

SECURITY

In Pursuit of Invisibility: Fileless Malware

I recently heard a news story about a survey in which people were asked whether they would prefer the ability to fly or to be invisible. Sure, it was a silly question*, but it was interesting to hear why people made their choices. The majority chose flight. What really fascinated me was that the sur…

August 21, 2018

SECURITY

Machine Learning: Beyond the buzzword

We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for some time. We have the experience, analytic skills, and collaboration skills that just aren’t there yet…

May 28, 2018

SECURITY

Join Us for Capture-the-Flag at Cisco Live Orlando

Cisco Live! US will be here before you know it – in about a month, actually. Aside from the exciting keynotes, breakout sessions, labs, and the opportunities to get hands-on with our latest technologies and face-to-face with the people who help build them, we have a couple of introductions from the…

April 26, 2018

SECURITY

Perspectives on Cryptomining

If you keep up with trends in security, you’ve likely heard about illicit cryptomining – software that hijacks system resources to generate cryptocurrencies. We’ve been busy updating our product portfolio to detect and protect against this new class of threat. We released a paper on illicit cryptomi…