cybersecurity
Security Starts from the Code
The month of May is an important month for companies operating in Europe. The General Data Protection Regulation (GDPR) kicks in and every company needs to comply to one of the most important changes in data privacy regulation in 20 years. Last year, as part of the Innovation Exchange activities in…
Four Ways to Simplify Security
This blog post was collaboratively written with Dinesh Shadrach. Dinesh Shadrach is a Sr. Product Manager in Cisco’s Security & Networking Business group where he oversees the design and evolution of Cisco’s cross-architecture software buying programs. Security breaches dominate the hea…
Joining the Charter of Trust
Today, I had the honor of representing Cisco as we officially joined the Charter of Trust Initiative. The Charter consists of multiple global organizations working together to outline key cybersecurity principles for establishing a new charter of trust between society, world governments, business pa…
[New Cybersecurity Report] How to Stay Ahead of the Latest Cyber Threats in Higher Ed
Twice each year, Cisco threat researchers and technology partners share data and analysis about cybercriminal activity that threatens networks around the globe. The goal of these cybersecurity reports is to arm you with information that can help you stop attackers or mitigate the impact of an attack…
The 3 Ps of Comprehensive Cybersecurity
There is no question that the threat of cybersecurity breaches is business impacting in our ever-increasing connected world. There are two data points that I like to use on this matter to illustrate the impact: According to a CIO Insight survey, 71% of executives surveyed said that concerns over cy…
Annual Cybersecurity Report: Impacts on Government
Cyber attacks against government are growing In our just released 2018 Annual Cybersecurity Report: Impacts on Government, we found that cyber attacks against agencies across the U.S. are increasing every day. From ransomware and distributed denial of service (DDoS) to IoT botnets and cryptojacking,…
Game Time Decision. Security or Innovation?
When it comes down to the decision of picking between network security or innovation it can seem like you are stuck between a rock and a hard place. You may feel like when you allocate your time, IT resources, and money to one, you are taking away from the other. The best security in the world won’t…
Cyberheroes: An Opportunity We Can’t Afford to Ignore
Digital innovation is one of the most exciting opportunities of our time. It seems like the futuristic depictions that once felt fictitious are quickly becoming reality. We can video call on our watches, cars can drive themselves, unmanned aerial vehicles (UAVs) help us find victims amidst fire and…
How to Harden Your Devices to Prevent Cyber Attacks
The 2016 Distributed Denial of Service attack on Dyn came from more than 100,000 infected devices. DDoS attacks leverage massive quantities of unsecured Internet-connected devices to disrupt Internet services worldwide [DYN]. The malicious and sophisticated attack kicked off serious conversations ab…