Cisco Security Grand Challenge

December 4, 2015

INNOVATION

Job One: Securing IoT

Recently, I participated in the panel on Internet of Things (IoT) security as part of the Automation Perspectives media event hosted by Rockwell Automation, just prior to Automation Fair 2015 in Chicago. It is clear that the ability to deal effectively with security threats is the No. 1 make-or-brea…

Why Should You Participate in the Cisco #IoT Security Grand Challenge?

Eight weeks ago, Cisco launched the Cisco IoT Security Grand Challenge, an industry-wide initiative to bring the global security community together to secure the IoT. Despite its overwhelming business benefits, IoT adoption also significantly increases security risks. So this Challenge is really jus…

April 8, 2014

SECURITY

Drivers for Managed Security and what to look for in a Cloud Provider [Summary]

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your…

April 8, 2014

DATA CENTER

Drivers for Managed Security and what to look for in a Cloud Provider

The first blog of this series discussing the role of data security in the cloud can be found here. In 2014 and onward, security professionals can expect to see entire corporate perimeters extended to the cloud, making it essential to choose a service provider that can deliver the security that your…

March 6, 2014

SECURITY

Data Security Through the Cloud [summary]

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…

March 6, 2014

DATA CENTER

Data Security Through the Cloud

Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG, 31% of security profes…