cyber security

February 6, 2018

PERSPECTIVES

Cyber Security Capture The Flag (CTF) Series Part 3: Implementing

Tim Harmon is a Cisco Champion, an elite group of technical experts who are passionate about IT and enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The program has been running for over five years and has earned two industry awards as an industry best pra…

December 18, 2017

DEVELOPER

Cyber Security is As Much about People as Technology

Cisco hosted the Southern California Cybercup Challenge in December in Cisco’s Customer Experience Center, and I was lucky to welcome a group of college and high school kids from across the state of California for the competition. Cisco hosts more than 2,500 customers a year in the John T. Chambers…

October 16, 2017

NETWORKING

Miercom Verifies Performance of Enterprise Campus Infrastructure in a Cisco vs. Huawei Bake Off

Networking product datasheet specifications at cursory glance may appear similar when you compare vendors. However, the devil is in the details and the similarities end quickly when testing and measuring their capabilities on performance, security, power efficiency, failover handling, and software p…

Is It Possible to Stop Modern Hackers? A Challenge for Telecom Operators.

Hackers now work in organised gangs that target individuals to infiltrate organisations. It’s hard to stop them – but by taking an integrated approach to security, service providers can stay ahead. Cyber crime has changed. At one time, hackers were lone operators breaking into systems to cause misch…

October 5, 2017

LIFE AT CISCO

I. Am. A. Woman. In. Tech.

Note to self: You ARE a woman in tech. You ARE part of the 11% of women in cybersecurity. You DO make an impact. You’re not alone – you have the #WeAreCisco fam behind you. Don’t ever, EVER forget that. For some time, I never considered myself a woman in tech because I did not hav…

For Next Generation Mobile Networks, We’ll Need to do Security Differently

Supporting 5G mobility will require a holistic approach to security from service providers Mobile networks are taking over the world. Our lives are increasingly based around connected devices. We already use phones and tablets almost constantly to keep in touch with friends and work more efficiently…

Why security is the key to media production and broadcast innovation?

Media broadcasters are increasingly using network technology to offer cloud-based, multiscreen services. An integrated approach to security is essential if they are to make the most of this opportunity It’s an exciting time in the broadcast media industry. Film production is growing fast. Creative a…

September 25, 2017

SP360: SERVICE PROVIDER

For Telecom service providers, cyber security is not an add-on

A rigorous and holistic approach to cyber security is critical for service providers, because trust is at the heart of their business Cyber attacks are a growing risk for organisations of all types. But security breaches can be particularly damaging for service providers, because their network infr…

September 22, 2017

SP360: SERVICE PROVIDER

Why network security is like a beehive

Effective threat protection means thinking about security before, during and after an attack Network security involves cutting edge technology. But it also follows principles that have long existed in nature. In fact, we can learn a lot about effective security by looking at the way bees defend the…