Articles
The CISO Evolution – From IT Operations to Earning a Seat at the Table
With the escalation of cybercrime, the role of Chief Information Security Officer (CISO) is fast evolving beyond its traditional operational functions of monitoring, repelling and responding to cyber threats. Continuous changes in our connected business landscape make customer data, intellectual pr…
Cybersecurity Awareness Begins – and Ends – with Employees
This month advocates worldwide continue to shine the light on cybersecurity. In the U.S. this week’s National Cyber Security Awareness Month theme is “From the Break Room to the Boardroom: Creating a Culture of Cybersecurity in the Workplace.” We at Cisco firmly believe that people are a core compon…
How Cybersecurity is Enabling – not Defeating – Business Innovation
The Digital Economy is rapidly changing our world – seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Internet of Things (IoT), mobility, cloud, business intelligence and soci…
Designing Security and Trust into the Cloud
Cloud computing has reached a tipping point as many organizations have either adopted, or are planning to adopt, some form of cloud computing technology – whether IT knows and manages it or not. “Speed to capability” is one of the primary reasons that individuals, business units and departments are…
Key Considerations for Threat-Based Security Programs
As we often say at Cisco, every business is a security business. That’s been true ever since widespread online presence led to widespread cyber threats. It became even more applicable as those threats became more sophisticated and less detectable. And now, with the Internet of Everything (IoE), that…
Double Winner: Cisco Wins Information Security Awards at CSO40
The city in the forest—Atlanta, Georgia—extended a double dose of Southern charm to Cisco in April by awarding two prestigious information security industry awards at the 2nd Annual CSO40 Awards. The awards program recognizes projects and initiatives demonstrating innovative use of security in deliv…
Defensive Security: The 95/5 Approach
Many organizations make the error of thinking that basic defensive software is sufficient to protect critical data and infrastructure. When in reality, in order for government and enterprise organizations to keep their data protected from increasingly advanced cyber threats, comprehensive defensive…
5