cybersecurity
Why the “Seven Steps of Cyber Resilience” Prove Critical for Digital Transformation
Organizations aren’t just talking about digital transformation – they’re doing it: More than 75 percent of global business leaders cite digitization as a top strategic priority and nearly seven in ten say their company will meet its digital transformation objectives this year, according to a recent…
#CiscoChat Recap — Utilities Security Imperative: More Real Than Ever
In recent years, utilities have risen in the ranks of common targets for cybercriminals. On Wednesday, December 7th, @Cisco_IoT and @CiscoUtilities hosted Utilities Security Imperative: More Real Than Ever, a #CiscoChat focused on cybersecurity for utilities companies. During this lively #CiscoChat,…
Question of the Year: Is Your Factory Secure?
It’s that time of year again – the annual board meeting. As the Head of Manufacturing, you’re ready to go with your presentation and review for the year. Slides look good – production was up and safety improved to just one minor incident. A new factory is coming online this year, and current progres…
Protecting Clinical Devices – the Achilles Heel of Healthcare
Everyday, hackers and cybercriminals are infiltrating networks. And they are especially interested in healthcare. That’s because stolen medical records are profitable, selling up to 10 times more than credit card numbers on the black market. But even more lucrative than identity theft is a ransomwar…
Protect, Detect, Respond – this cybersecurity mindset is also for payTV providers
In the world of cybersecurity, many organizations have implemented some version of the ‘identify, protect, detect, respond, recover’ framework proposed by United States National Institute of Standards and Technology (NIST). Underpinning this framework is an acknowledgement that cybersecurity is not…
Join our #CiscoChat – Utilities security imperative: more real than ever
Utilities across the globe are telling us that cybersecurity risks and protecting data from intrusion and manipulation are among their highest concerns. To shed light on this critical topic, we are hosting a #CiscoChat to learn how utilities are approaching their cybersecurity strategies on Wednesda…
5 Steps to Zero Trust Data Center with Cisco Tetration Analytics
In a recent cybersecurity study, Gartner reported that data center protection is the foundation of digital business and innovation. With organizations embracing digital business, they need to address the lack of directly owned IT infrastructure and the prevalence of services outside of IT’s c…
Safety Manufacturer Gets Agile Security
Ansell, a leading manufacturer of safety solutions, helps protect workers across the globe and is now protecting itself from outside threats like hacking, phishing, and ransomware. They recently implemented a cybersecurity strategy across their operations – not an easy task for a global compan…
Hello Customer, We’ve Got Your Back!
According to Chuck Robbins, “At Cisco you, our customers, are our number one priority. We can only be successful if we’ve helped you be successful.” The customer experience has always been a top priority for Cisco. But over the last several quarters, Cisco Security has been hyper-focused on ensuring…
1